D-Link DXS-1100-10TS User Manual - Page 42

System > System Log > System Log, System > Time and SNTP > Clock Settings

Page 42 highlights

4 Configuration D-Link 10 Gigabit Ethernet Switch User Manual UDP Port: Specifies the UDP port to which the server logs are sent. This value must be 514, or between 1024 and 65535. The default value is 514. Severity: Select the severity value of the type of information that will be logged. Options to choose from are 0 (Emergencies), 1 (Alerts), 2 (Critical), 3 (Errors), 4 (Warnings), 5 (Notifications), 6 (Informational), and 7 (Debugging). Facility: Select the facility value here. Options to choose from are 0 to 23. Discriminator Name: Enter the discriminator name here. This name can be up to 15 characters long. Click Apply to accept the changes made. Click Delete to remove the specified entry. System > System Log > System Log This window is used to view and clear the system log. The maximum number of entries that will be displayed in this table is 1,000. The index number can go up to 90,000. When this log is full, older entries will be removed and replaced by newer ones. Figure 4.37 - System > System Log > System Log Click Clear Log to clear the system log entries displayed in the table. Enter a page number and click Go to navigate to a specific page when multiple pages exist. System > System Log > System Attack Log This window is used to view and clear the system attack log. The maximum number of entries that will be displayed in this table is 1,000. The index number can go up to 90,000. When this log is full, older entries will be removed and replaced by newer ones. Figure 4.38 - System > System Log > System Attack Log Click Clear Attack Log to clear the system attack log entries displayed in the table. System > Time and SNTP > Clock Settings The Simple Network Time Protocol (SNTP) is a protocol for synchronizing computer clocks through the Internet. It provides comprehensive mechanisms to access national time and frequency dissemination 35

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121

4 Configuration
D-Link 10 Gigabit Ethernet Switch User Manual
35
UDP Port:
Specifies the UDP port to which the server logs are sent. This value must be 514, or between
1024 and 65535. The default value is
514
.
Severity:
Select the severity value of the type of information that will be logged. Options to choose from are
0 (Emergencies)
,
1 (Alerts)
,
2 (Critical)
,
3 (Errors)
,
4 (Warnings)
,
5 (Notifications)
,
6 (Informational)
,
and
7 (Debugging)
.
Facility:
Select the facility value here.
Options to choose from are 0 to 23.
Discriminator Name:
Enter the discriminator name here. This name can be up to 15 characters long.
Click
Apply
to accept the changes made.
Click
Delete
to remove the specified entry.
System > System Log > System Log
This window is used to view and clear the system log. The maximum number of entries that will be displayed
in this table is 1,000. The index number can go up to 90,000. When this log is full, older entries will be
removed and replaced by newer ones.
Figure 4.37 – System > System Log > System Log
Click
Clear Log
to clear the system log entries displayed in the table.
Enter a page number and click
Go
to navigate to a specific page when multiple pages exist.
System > System Log > System Attack Log
This window is used to view and clear the system attack log. The maximum number of entries that will be
displayed in this table is 1,000. The index number can go up to 90,000. When this log is full, older entries will
be removed and replaced by newer ones.
Figure 4.38 – System > System Log > System Attack Log
Click
Clear Attack Log
to clear the system attack log entries displayed in the table.
System > Time and SNTP > Clock Settings
The Simple Network Time Protocol (SNTP) is a protocol for synchronizing computer clocks through the
Internet. It provides comprehensive mechanisms to access national time and frequency dissemination