xi
About Security Audit Logging ....................................................................................................................... 14-6
Security Events Logged ......................................................................................................................... 14-7
Trap Generation ..................................................................................................................................... 14-7
Format Examples ................................................................................................................................... 14-8
Configuring Syslog ....................................................................................................................................... 14-8
Syslog Command Precedence ............................................................................................................... 14-8
About Server and Application Severity Levels ....................................................................................... 14-9
Configuring Syslog Server(s) ................................................................................................................. 14-9
Example............................................................................................................................................14-9
Modifying Syslog Server Defaults ........................................................................................................ 14-10
Displaying System Logging Defaults..............................................................................................14-10
Modifying Default Settings..............................................................................................................14-10
Reviewing and Configuring Logging for Applications ........................................................................... 14-10
Displaying Current Application Severity Levels..............................................................................14-11
Enabling Console Logging and File Storage ........................................................................................ 14-11
Displaying to the Console and Saving to a File..............................................................................14-11
Configuration Examples ....................................................................................................................... 14-12
Enabling a Server and Console Logging ........................................................................................14-12
Adjusting Settings to Allow for Logging at the Debug Level...........................................................14-12
Chapter 15: Configuring Spanning Tree
Spanning Tree Protocol Overview ................................................................................................................ 15-1
Why Use Spanning Trees? .................................................................................................................... 15-2
Spanning Tree on Enterasys Platforms ................................................................................................. 15-2
STP Operation .............................................................................................................................................. 15-3
Rapid Spanning Tree Operation ............................................................................................................ 15-4
Multiple Spanning Tree Operation ......................................................................................................... 15-4
Functions and Features Supported on Enterasys Devices ..........................................................................15-6
Spanning Tree Versions ......................................................................................................................... 15-6
Maximum SID Capacities ....................................................................................................................... 15-6
Network Diameter .................................................................................................................................. 15-6
Port Forwarding ...................................................................................................................................... 15-6
Disabling Spanning Tree ........................................................................................................................ 15-7
STP Features ......................................................................................................................................... 15-7
SpanGuard .......................................................................................................................................15-7
Loop Protect .....................................................................................................................................15-7
Updated 802.1t.................................................................................................................................15-8
Multisource Detection.......................................................................................................................15-8
Spanning Tree Basics .................................................................................................................................. 15-9
Spanning Tree Bridge Protocol Data Units ............................................................................................ 15-9
Electing the Root Bridge ........................................................................................................................ 15-9
Assigning Path Costs ............................................................................................................................. 15-9
Paths to Root ....................................................................................................................................... 15-10
Identifying Designated, Alternate, and Backup Port Roles .................................................................. 15-12
Assigning Port States ........................................................................................................................... 15-13
RSTP Operation ................................................................................................................................... 15-14
MSTP Operation .................................................................................................................................. 15-14
Common and Internal Spanning Tree (CIST).................................................................................15-14
MST Region....................................................................................................................................15-15
Multiple Spanning Tree Instances (MSTI) ......................................................................................15-16
Configuring STP and RSTP ........................................................................................................................ 15-19
Reviewing and Enabling Spanning Tree .............................................................................................. 15-20
Example..........................................................................................................................................15-20
Adjusting Spanning Tree Parameters .................................................................................................. 15-20
Setting Bridge Priority Mode and Priority........................................................................................15-21