# CTE Resource Center - Verso - Computer Networking Hardware Operations IV Task 1181993319

CTE Resource Center - Verso

Virginia’s CTE Resource Center

Verify syslog.


Verification should include
  • configuring a logging destination
  • configuring a trapping security level and logging source interface
  • creating a deliberate syslog error and viewing the result
  • verifying syslog operation using specific parameters.