• the internal buffer• console and terminal lines• any configured syslog serversTo disable logging, use the following commands.• Disable all logging except on the console.CONFIGURATION modeno logging on• Disable logging to the logging buffer.CONFIGURATION modeno logging buffer• Disable logging to terminal lines.CONFIGURATION modeno logging monitor• Disable console logging.CONFIGURATION modeno logging consoleAudit and Security LogsThis section describes how to configure, display, and clear audit and security logs.The following is the configuration task list for audit and security logs:• Enabling Audit and Security Logs• Displaying Audit and Security Logs• Clearing Audit LogsEnabling Audit and Security LogsYou enable audit and security logs to monitor configuration changes or determine if these changes affect the operation of the system in thenetwork. You log audit and security events to a system log server, using the logging extended command in CONFIGURATION mode.This command is available with or without RBAC enabled. For information about RBAC, see Role-Based Access Control.Audit LogsThe audit log contains configuration events and information. The types of information in this log consist of the following:• User logins to the switch.• System events for network issues or system issues.• Users making configuration changes. The switch logs who made the configuration changes and the date and time of thechange. However, each specific change on the configuration is not logged. Only that the configuration was modified is logged with theuser ID, date, and time of the change.• Uncontrolled shutdown.Security Logs66 Management