Solved

Meaning and difference among Console logging, Monitor logging and Buffer logging in show logging

Posted on 2014-11-25
2
251 Views
Last Modified: 2014-12-22
Hi Experts
I am not very clear about the meaning of these terms in the following output of router. Any experts can explain the meaning and the difference among following terms: Console logging, Monitor logging and Buffer logging in the output. Or send me a link. Thank you

------------
R11(config)#do show logging
Syslog logging: enabled (0 messages dropped, 1 messages rate-limited, 0 flushes, 0 overruns, xml disabled)
    Console logging: level debugging, 12 messages logged, xml disabled
    Monitor logging: level debugging, 0 messages logged, xml disabled
    Buffer logging: level debugging, 0 messages logged, xml disabled
    Logging Exception size (4096 bytes)
    Count and timestamp logging messages: disabled
    Trap logging: level informational, 17 message lines logged
0
Comment
Question by:EESky
  • 2
2 Comments
 
LVL 14

Assisted Solution

by:Otto_N
Otto_N earned 500 total points
ID: 40466239
Console logging - The messages sent to the console port. (This is the messages you'll see when you're physically connected to the console port on the router.)
Monitor logging - The messages logged to any session (such as telnet) that enable monitoring via the "terminal monitor" command.  (This is the messages you'll see when you telnet to the router and type "terminal monitor" on the CLI.)
Buffer logging - The messages stored in the router's log buffer.  (The messages that gets shown in the "show logging" output.)
0
 
LVL 14

Accepted Solution

by:
Otto_N earned 500 total points
ID: 40466513
I found a link for you as well.  Table 7 in the Cisco IOS Configuration Fundamentals Command Reference entry for "show logging" have a more formal definition of the fields.

You can also check out the "Logging System Messages" section of the "Basic System Management Configuration Guide, Cisco IOS Release 15M&T".
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There are two basic ways to configure a static route for Cisco IOS devices. I've written this article to highlight a case study comparing the configuration of a static route using the next-hop IP and the configuration of a static route using an outg…
Tired of waiting for your show or movie to load?  Are buffering issues a constant problem with your internet connection?  Check this article out to see if these simple adjustments are the solution for you.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now