Is there anyway to rebuild IOS messages in the CLI (for example "%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/1/0, changed state to down") when the content of the CLI has been deleted?
I build a network... everything is fine... Then i give the command "no clock rate 64000" on the DCE interface... Then i delete the content of de CLI... 5 minutes later, another admin came in, he see that the network is not converged. The first thing he want to do is to look in the CLI what the IOS gave for message... (in this example --> "%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial0/1/0, changed state to down"). But the content of the CLI was deleted by me...
Now the question is... Can he restore the content, so he can see the last IOS messages?
If you can't see "%LINEPROTO-5-UPDOWN..." with "show logging", the message has been overwritten in the internal circular buffer. The size of this buffer is controlled by "logging buffered ". If you have "logging " configured, you might find the message on your syslog server , provided the in your "logging trap " covers that in your "logging buffered ".
You can delete the content in the internal buffer with "clear logging". However, I don't think there's a way to "rebuild" content once it's flushed from the buffer, either manually or when the buffer gets full.
To retrieve old content, you'd have to have the router sending the buffer content to an external logging server, as I mentioned earlier.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...