The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes how to configure the Wireless LAN Controller for syslog servers.
Contributed by Tiago Antunes, Cisco TAC Engineer.
Cisco recommends that you have knowledge of these topics:
Knowledge of how to configure the Wireless LAN Controller (WLC) and Lightweight Access Point (LAP) for basic operation.
Basic knowledge of Control And Provisioning of Wireless Access Point (CAPWAP) protocol.
The information in this document is based on these software and hardware versions:
Wireless LAN Controllers running AireOS 8.8.111.0 Software.
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
Message logging allows system messages to be logged to the controller buffer or console.
For more information about system messages and trap logs, seehttps://www.cisco.com/c/en/us/support/wireless/wireless-lan-controller-software/products-system-message-guides-list.html
As from AireOS 8.4 you have the ability to disable syslog server per AP and/or global via the WLC CLI.
On version 8.8 it was introduced the support for syslog facility on Wave 2 APs.
You can enable and configure the controller to log system events to up to three remote syslog servers. The controller sends a copy of each syslog message as it is logged to each syslog server configured on the controller. Because it is able to send the syslog messages to multiple servers, it ensures that the messages are not lost due to the temporary unavailability of one syslog server.
This type of configuration helps in these situations:
Note: Syslog messages are sent on UDP Port 514; additional server configuration can require a proper configuration of firewall rules.
Note: When a primary WLC port link goes down, messages can get logged internally only and not be posted to a syslog server. It can take up to 40 seconds to restore logging to the syslog server.
Step 1. Go to Management > Logs > Config. The Syslog Configuration page appears:
Step 2. Enter the Syslog Server IP Address and click Add. You can add up to three syslog servers to the controller. The list of syslog servers that have already been added to the controller appears under this text box. If you want to remove a syslog server from the controller, click Remove to the right of the desired server.
Step 3. To set the Syslog Level (severity) for filtering syslog messages to the syslog servers, choose one of the following options from the Syslog Level drop-down list:
Note: If you have enabled logging of Debugging messages to the logging buffer, some messages from application debug could be listed in message log with severity that is more than the level set. For example, if you execute the debug client mac-addr command, the client event log could be listed in message log even though the message severity level is set to Errors.
Step 4. To set the Syslog Facility for outgoing syslog messages to the syslog servers, choose one of the following options from the Syslog Facility drop-down list:
For example, selecting Kernel makes only kernel related messages to be sent. Authorization, makes only AAA related messages to be sent, etc.
Step 5. Click Apply.
Step 1. Enable system logging and set the IP address of the syslog server to which to send the syslog messages by entering this command:
(Cisco Controller) >config logging syslog host server_IP_address
Step 2. To remove a syslog server from the controller by entering this command:
(Cisco Controller) >config logging syslog host server_IP_address delete
Step 3. Set the severity level for filtering syslog messages to the syslog server by entering this command:
(Cisco Controller) >config logging syslog level severity_level
Note: As severity_level you can enter the word or number. For example: debugging or 7.
Using this command the WLC logs the debug output to the syslog server. However, if the CLI session is terminiated, the debug ends and there is no more output sent to the syslog server.
(Cisco Controller) >config logging debug syslog enable
Step 1.To configure the syslog server ip address, you must use the CLI. You can set the ip address globaly for all APs or for a specific AP.
(Cisco Controller) >config ap syslog host ?
global Configures the global system logging host for all Cisco AP
specific Configures the system logging host for a specific Cisco AP.
(Cisco Controller) >config ap syslog host global ?
<ip_address> IP address of the global system logging host for all Cisco AP
(Cisco Controller) >config ap syslog host global 10.0.0.1
Setting the AP Global Syslog host will overwrite all AP Specific Syslog host configurations!
Are you sure you would like to set the AP Global Syslog host? (y/n) y
AP Global Syslog host has been set.
(Cisco Controller) >show ap config global
AP global system logging host.................... 10.0.0.1
AP global system logging level................... debugging
AP Telnet Settings............................... Globally Configured (Disabled)
AP SSH Settings.................................. Globally Configured (Disabled)
Diminished TX power Settings..................... Globally Configured (Disabled)
Step 2. Via the CLI we can also set the syslog and severity level for filtering syslog messages for a particular access point or for all access points by entering these commands:
(Cisco Controller) >config ap logging syslog level severity_level
Note: As severity_level you can enter the word or number. For example: debugging or 7.
Step 3. Set the facility for outgoingsyslogmessages to thesyslogserver by entering this command:
(Cisco Controller) >config logging syslog facility facility-code
ap = AP related traps.
authorization = Authorization system. Facility level = 4.
Step 3. Configure the syslog facility for AP using the following command:
(Cisco Controller) >config logging syslog facility AP
Step 4. Configure the syslog facility for an AP or all APs by entering this command:
(Cisco Controller) >config ap logging syslog facility facility-level {Cisco_AP| all}
Note: The AP driver debugs are not enabled on the WLC. If you have access to the AP console, the driver debugs can be enabled.
Following are the debugging commands on the WLC CLI:(Cisco Controller) >debug flexconnect client ap ap-name{add|delete}mac-addr1 mac-addr2 mac-addr3 mac-addr4
(Cisco Controller) >debug flexconnect client apap-namesyslog{server-ip-address|disable}
(Cisco Controller) >debug flexconnect client groupgroup-name{add|delete}mac-addr1 mac-addr2 mac-addr3 mac-addr4
(Cisco Controller) >debug flexconnect client groupgroup-namesyslog{server-ip-address|disable}
(Cisco Controller) >show debug
The debugging commands that can be entered on the AP console are listed here. These commands are applicable for debugging the client AP console when it is accessible. If you enter these commands on the AP console, the commands are not communicated to the WLC.
AP#[no]debug condition mac-address mac-addr
AP#[no]debug dot11 client
Note: It is not possible to change the syslog port being used.
(Cisco Controller) >show logging
Logging to Logger Queue :
- Logging of system messages to Logger Queue :
- Effective Logging Queue filter level.......... debugging
- Number of Messages recieved for logging :
- Emergency severity............................ 0
- Alert Severity................................ 0
- Critical Severity............................. 0
- Error Severity................................ 9
- Warning Severity.............................. 6
- Notice Severity............................... 210
- Information Severity.......................... 8963
- Debug Severity................................ 5
- Total messages recieved....................... 9193
- Total messages enqueued....................... 2815
- Total messages dropped........................ 6378
Logging to buffer :
- Logging of system messages to buffer :
- Logging filter level.......................... errors
- Number of system messages logged.............. 9
- Number of system messages dropped.............
- Number of Messages dropped due to Facility .... 09195
- Logging of debug messages to buffer ........... Disabled
- Number of debug messages logged............... 0
- Number of debug messages dropped.............. 0
- Cache of logging ............................. Disabled
- Cache of logging time(mins) ................... 10080
- Number of over cache time log dropped ........ 0
Logging to console :
- Logging of system messages to console :
- Logging filter level.......................... disabled
- Number of system messages logged.............. 0
- Number of system messages dropped............. 9204
- Number of system messages throttled........... 0
- Logging of debug messages to console .......... Enabled
- Number of debug messages logged............... 0
- Number of debug messages dropped.............. 0
- Number of debug messages throttled............ 0
Logging to syslog :
- Syslog facility................................ local0
- Logging of system messages to syslog :
- Logging filter level.......................... debugging
- Number of system messages logged.............. 2817
- Number of system messages dropped............. 6387
- Logging of debug messages to syslog ........... Disabled
- Number of debug messages logged............... 0
- Number of debug messages dropped.............. 0
- Number of remote syslog hosts.................. 1
- syslog over tls................................ Disabled
- syslog over ipsec.............................. Disabled
- ipsec profile inuse for syslog................. none
- Host 0....................................... 192.168.100.2
- Host 1.......................................
- Host 2.......................................
Logging of Debug messages to file :
- Logging of Debug messages to file.............. Disabled
- Number of debug messages logged................ 0
- Number of debug messages dropped............... 0
Logging of traceback............................. Enabled
- Traceback logging level........................ errors
Logging of source file informational............. Enabled
Timestamping of messages.........................
- Timestamping of system messages................ Enabled
- Timestamp format.............................. Date and Time
- Timestamping of debug messages................. Enabled
- Timestamp format.............................. Date and Time
[...]
(Cisco Controller) >
To see the global syslog server settings for all access points that join the controller by entering this command: show ap config global.
Information similar to the following appears:
AP global system logging host.................... 10.0.0.1
To display the AP-specificsyslogserver settings for an AP use the command show ap config generalap-name.
Example:
(Cisco Controller) >show ap config general testAP
Cisco AP Identifier.............................. 1
Cisco AP Name.................................... testAP
[...]
Remote AP Debug ................................. Disabled
Logging trap severity level ..................... informational
KPI not configured ..............................
Logging syslog facility ......................... kern
S/W Version .................................... 8.8.111.0
[...]
Revision | Publish Date | Comments |
---|---|---|
2.0 |
03-Nov-2022 |
Added a small note about syslog UDP port |
1.0 |
22-May-2008 |
Initial Release |