<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: WeSeverity 0 Emergency acct-stop message in syslog in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/weseverity-0-emergency-acct-stop-message-in-syslog/m-p/98000#M9323</link>
    <description>&lt;P&gt;I understand how to change the logging level being outputted on the access point, that's not my question.&lt;/P&gt;&lt;P&gt;On the Access points, there are dozens of ACCT-START and ACCT-STOP messages that are coming through, that indicate the start of an authentication session and the end of a session, normal every day traffic, level 6, informational messages.&lt;/P&gt;&lt;P&gt;However, in the log files these events are being sent as level 0 emergency messages, (the highest severity of log), when they really should be level 6.&amp;nbsp; This information is present in the AP and in the centralized logging server I have set up.&amp;nbsp; How do I change the severity of these messages so that they are reported as level 6 informational and not level 0 emergency messages.&amp;nbsp; Here is an example of an entry from today:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class=""&gt;host: &amp;lt;ip of AP&amp;gt;&lt;/DIV&gt;&lt;DIV class=""&gt;message: &amp;lt;6&amp;gt; Sep 17 11:04:13 ACCT-STOP User-Name:- IPv4-Address: &amp;lt;client ip&amp;gt; Session-Id:1238 Calling-Station:&amp;lt;mac-address-1&amp;gt; Called-Station:&amp;lt;mac-address-2&amp;gt; Packets-In:71 Packets-Out:13 Bytes-In:668 Bytes-Out:1298&lt;/DIV&gt;&lt;DIV class=""&gt;priority: 0&lt;/DIV&gt;&lt;DIV class=""&gt;severity: 0&lt;/DIV&gt;&lt;DIV class=""&gt;severity_label: Emergency&lt;/DIV&gt;&lt;DIV class=""&gt;type: syslog&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Does that make sense.&amp;nbsp; These log entries are being presented as emergencies when they are not emergencies, I want to change the classification of the event&lt;/P&gt;&lt;P&gt;config:&amp;nbsp;&lt;BR /&gt;--virtual-controller-ip-hostname--*&amp;gt;show running-config&lt;BR /&gt;!&lt;BR /&gt;! Configuration of AP7522 version 5.8.6.7-002R&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;version 2.5&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;client-identity-group default&lt;BR /&gt;load default-fingerprints&lt;BR /&gt;!&lt;BR /&gt;ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"&lt;BR /&gt;permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit D HCP replies"&lt;BR /&gt;deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-descriptio n "deny windows netbios"&lt;BR /&gt;deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast"&lt;BR /&gt;deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP l ocal broadcast"&lt;BR /&gt;permit ip any any rule-precedence 100 rule-description "permit all IP traffic"&lt;BR /&gt;!&lt;BR /&gt;mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt;permit any any type ip rule-precedence 10 rule-description "permit all IPv4 tra ffic"&lt;BR /&gt;permit any any type arp rule-precedence 20 rule-description "permit all ARP tra ffic"&lt;BR /&gt;!&lt;BR /&gt;ip snmp-access-list default&lt;BR /&gt;permit any&lt;BR /&gt;!&lt;BR /&gt;firewall-policy default&lt;BR /&gt;no ip dos tcp-sequence-past-window&lt;BR /&gt;no stateful-packet-inspection-l2&lt;BR /&gt;ip tcp adjust-mss 1400&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mint-policy global-default&lt;BR /&gt;!&lt;BR /&gt;meshpoint-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;wlan-qos-policy &amp;lt;wifi-name&amp;gt;&lt;BR /&gt;rate-limit client to-air rate 5000&lt;BR /&gt;rate-limit client from-air rate 5000&lt;BR /&gt;qos trust dscp&lt;BR /&gt;qos trust wmm&lt;BR /&gt;!&lt;BR /&gt;wlan-qos-policy default&lt;BR /&gt;qos trust dscp&lt;BR /&gt;qos trust wmm&lt;BR /&gt;!&lt;BR /&gt;radio-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;association-acl-policy &amp;lt;wifi-network&amp;gt;&lt;BR /&gt;permit &amp;lt;mac-address&amp;gt; precedence 2&lt;BR /&gt;permit &amp;lt;mac-address&amp;gt; precedence 3&lt;BR /&gt;permit &amp;lt;mac-address&amp;gt; precedence 4&lt;BR /&gt;permit &amp;lt;mac-address&amp;gt; precedence 5&lt;BR /&gt;permit &amp;lt;mac-address&amp;gt; precedence 6&lt;BR /&gt;(repeat-lines-omitted)&lt;BR /&gt;!&lt;BR /&gt;wlan &amp;lt;wifi-name&amp;gt;&lt;BR /&gt;ssid &amp;lt;wifi-name&amp;gt;&lt;BR /&gt;vlan 1&lt;BR /&gt;bridging-mode local&lt;BR /&gt;encryption-type &amp;lt;omitted&amp;gt;&lt;BR /&gt;authentication-type none&lt;BR /&gt;no client-client-communication&lt;BR /&gt;no fast-bss-transition over-ds&lt;BR /&gt;wpa-wpa2 psk 0 &amp;lt;key&amp;gt;&lt;BR /&gt;accounting syslog host &amp;lt;syslog-server-ip&amp;gt; port &amp;lt;port&amp;gt;&lt;BR /&gt;use wlan-qos-policy &amp;lt;wifi-name&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;wips-policy default&lt;BR /&gt;!&lt;BR /&gt;auto-provisioning-policy default&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;management-policy default&lt;BR /&gt;no telnet&lt;BR /&gt;no http server&lt;BR /&gt;https server&lt;BR /&gt;ssh&lt;BR /&gt;user admin password &amp;lt;password&amp;gt; role superuser access all&lt;BR /&gt;snmp-server community 0 private rw&lt;BR /&gt;snmp-server community 0 public ro&lt;BR /&gt;snmp-server user snmptrap v3 encrypted des auth md5 0 &amp;lt;password&amp;gt;&lt;BR /&gt;snmp-server user snmpmanager v3 encrypted des auth md5 &amp;lt;password&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;event-system-policy default&lt;BR /&gt;!&lt;BR /&gt;nsight-policy default&lt;BR /&gt;!&lt;BR /&gt;profile ap7522 default-ap7522&lt;BR /&gt;use enterprise-ui&lt;BR /&gt;autoinstall configuration&lt;BR /&gt;autoinstall firmware&lt;BR /&gt;crypto ikev1 policy ikev1-default&lt;BR /&gt;isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt;crypto ikev2 policy ikev2-default&lt;BR /&gt;isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt;crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ikev1 remote-vpn&lt;BR /&gt;crypto ikev2 remote-vpn&lt;BR /&gt;crypto auto-ipsec-secure&lt;BR /&gt;crypto load-management&lt;BR /&gt;crypto remote-vpn-client&lt;BR /&gt;interface radio1&lt;BR /&gt;wlan &amp;lt;wifi-name&amp;gt; bss 1 primary&lt;BR /&gt;interface radio2&lt;BR /&gt;wlan &amp;lt;wifi-name&amp;gt; bss 1 primary&lt;BR /&gt;interface ge1&lt;BR /&gt;interface vlan1&lt;BR /&gt;ip address dhcp&lt;BR /&gt;ip address zeroconf secondary&lt;BR /&gt;ip dhcp client request options all&lt;BR /&gt;interface pppoe1&lt;BR /&gt;use event-system-policy default&lt;BR /&gt;use firewall-policy default&lt;BR /&gt;ntp server 138.236.128.36 autokey&lt;BR /&gt;use client-identity-group default&lt;BR /&gt;logging on&lt;BR /&gt;service pm sys-restart&lt;BR /&gt;router ospf&lt;BR /&gt;!&lt;BR /&gt;rf-domain default&lt;BR /&gt;location &amp;lt;location&amp;gt;&lt;BR /&gt;contact &amp;lt;admin&amp;gt;&lt;BR /&gt;timezone America/Chicago&lt;BR /&gt;country-code us&lt;BR /&gt;use nsight-policy default&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP2&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP2&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;interface vlan1&lt;BR /&gt;description "primary domain"&lt;BR /&gt;ip address &amp;lt;ip-address-AP2&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP3&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP3&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;interface vlan1&lt;BR /&gt;ip address &amp;lt;IP address-AP3&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;macaddress-AP4&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP4&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;ip default-gateway &amp;lt;gateway-ip&amp;gt;&lt;BR /&gt;interface vlan1&lt;BR /&gt;ip address &amp;lt;ip-address-AP4&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 ,&amp;lt;mac-address-AP5&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP5&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;ip name-server &amp;lt;name-server-IP&amp;gt;&lt;BR /&gt;interface vlan1&lt;BR /&gt;description "main network"&lt;BR /&gt;ip address &amp;lt;ip-address-AP5&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP6&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname&amp;lt;hostname-AP6&amp;gt;&lt;/P&gt;&lt;P&gt;location default&lt;BR /&gt;no adoption-mode&lt;BR /&gt;interface vlan1&lt;BR /&gt;description "main network"&lt;BR /&gt;ip address &amp;lt;ip-address-AP6&amp;gt;/24&lt;BR /&gt;use auto-provisioning-policy default&lt;BR /&gt;virtual-controller&lt;BR /&gt;rf-domain-manager capable&lt;BR /&gt;logging buffered informational&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP7&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP7&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;interface vlan1&lt;BR /&gt;ip address &amp;lt;ip-address-AP7&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP8&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP8&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;interface vlan1&lt;BR /&gt;no description&lt;BR /&gt;ip address &amp;lt;ip-address-AP8&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP9&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP9&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;interface vlan1&lt;BR /&gt;description "main network"&lt;BR /&gt;ip address &amp;lt;ip-address-AP9&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
    <pubDate>Fri, 17 Nov 2023 22:13:47 GMT</pubDate>
    <dc:creator>cwensink</dc:creator>
    <dc:date>2023-11-17T22:13:47Z</dc:date>
    <item>
      <title>WeSeverity 0 Emergency acct-stop message in syslog</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/weseverity-0-emergency-acct-stop-message-in-syslog/m-p/97887#M9318</link>
      <description>&lt;P&gt;We have 8 Extreme Wing AP-7522 AP's running in a small business WLAN, and all of the AP's are dumping messages like this into our logging server:&lt;/P&gt;&lt;P&gt;type: syslog&lt;/P&gt;&lt;P&gt;facility:0&lt;/P&gt;&lt;P&gt;faclity_label: kernal&lt;/P&gt;&lt;P&gt;host: &amp;lt;IP of Access point&amp;gt;&lt;/P&gt;&lt;P&gt;message &amp;lt;6&amp;gt; Sep 10 12:24:49 ACCT-START User-Name:- IPv4-Address:&amp;lt;client ip&amp;gt; Session-Id:2541 Calling-Station:&amp;lt;mac-adress-1&amp;gt; Called-Station:&amp;lt;mac-address-2&amp;gt;&lt;/P&gt;&lt;P&gt;priority: 0&lt;/P&gt;&lt;P&gt;severity: 0&lt;/P&gt;&lt;P&gt;severity_label: Emergency&lt;/P&gt;&lt;P&gt;I ran this message past my Linux admin mentor and he said "the ACCT-START message typically indicates the start of an accounting session in the RADIUS protocol, which is often used for authentication in wireless networks. This is usually a routine message."&lt;/P&gt;&lt;P&gt;So, first I wanted to confirm that this is a routine message, and second how can I change the severity level of these log messages so they don't appear as emergencies?&lt;/P&gt;&lt;P&gt;It's mostly ACCT-STOP messages but there are some ACCT-START messages that have the same severity.&lt;/P&gt;&lt;P&gt;Thanks for the help.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Nov 2023 16:06:58 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/weseverity-0-emergency-acct-stop-message-in-syslog/m-p/97887#M9318</guid>
      <dc:creator>cwensink</dc:creator>
      <dc:date>2023-11-10T16:06:58Z</dc:date>
    </item>
    <item>
      <title>Re: WeSeverity 0 Emergency acct-stop message in syslog</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/weseverity-0-emergency-acct-stop-message-in-syslog/m-p/97924#M9322</link>
      <description>&lt;P&gt;Not sure how things are set up at your end since we don't have any visibility into your config but here's a way to changes the logging level in WiNG:&lt;/P&gt;&lt;P&gt;SSH into the controller and run the following command:&lt;/P&gt;&lt;P&gt;#self&lt;/P&gt;&lt;P&gt;#logging buffered ?&lt;BR /&gt;&amp;lt;0-7&amp;gt; Logging severity level&lt;BR /&gt;emergencies System is unusable (0)&lt;BR /&gt;alerts Immediate action needed (1)&lt;BR /&gt;critical Critical conditions (2)&lt;BR /&gt;errors Error Conditions (3)&lt;BR /&gt;warnings Warning conditions (4)&lt;BR /&gt;notifications Normal but significant conditions (5)&lt;BR /&gt;informational Informational messages (6)&lt;BR /&gt;debugging Debugging messages (7)&lt;/P&gt;&lt;P&gt;Select one of the options and save.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let us know if this is what you are looking for.&lt;/P&gt;&lt;P&gt;BR,&lt;/P&gt;</description>
      <pubDate>Tue, 14 Nov 2023 15:04:53 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/weseverity-0-emergency-acct-stop-message-in-syslog/m-p/97924#M9322</guid>
      <dc:creator>Christoph_S</dc:creator>
      <dc:date>2023-11-14T15:04:53Z</dc:date>
    </item>
    <item>
      <title>Re: WeSeverity 0 Emergency acct-stop message in syslog</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/weseverity-0-emergency-acct-stop-message-in-syslog/m-p/98000#M9323</link>
      <description>&lt;P&gt;I understand how to change the logging level being outputted on the access point, that's not my question.&lt;/P&gt;&lt;P&gt;On the Access points, there are dozens of ACCT-START and ACCT-STOP messages that are coming through, that indicate the start of an authentication session and the end of a session, normal every day traffic, level 6, informational messages.&lt;/P&gt;&lt;P&gt;However, in the log files these events are being sent as level 0 emergency messages, (the highest severity of log), when they really should be level 6.&amp;nbsp; This information is present in the AP and in the centralized logging server I have set up.&amp;nbsp; How do I change the severity of these messages so that they are reported as level 6 informational and not level 0 emergency messages.&amp;nbsp; Here is an example of an entry from today:&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;DIV class=""&gt;host: &amp;lt;ip of AP&amp;gt;&lt;/DIV&gt;&lt;DIV class=""&gt;message: &amp;lt;6&amp;gt; Sep 17 11:04:13 ACCT-STOP User-Name:- IPv4-Address: &amp;lt;client ip&amp;gt; Session-Id:1238 Calling-Station:&amp;lt;mac-address-1&amp;gt; Called-Station:&amp;lt;mac-address-2&amp;gt; Packets-In:71 Packets-Out:13 Bytes-In:668 Bytes-Out:1298&lt;/DIV&gt;&lt;DIV class=""&gt;priority: 0&lt;/DIV&gt;&lt;DIV class=""&gt;severity: 0&lt;/DIV&gt;&lt;DIV class=""&gt;severity_label: Emergency&lt;/DIV&gt;&lt;DIV class=""&gt;type: syslog&lt;/DIV&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;Does that make sense.&amp;nbsp; These log entries are being presented as emergencies when they are not emergencies, I want to change the classification of the event&lt;/P&gt;&lt;P&gt;config:&amp;nbsp;&lt;BR /&gt;--virtual-controller-ip-hostname--*&amp;gt;show running-config&lt;BR /&gt;!&lt;BR /&gt;! Configuration of AP7522 version 5.8.6.7-002R&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;version 2.5&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;client-identity-group default&lt;BR /&gt;load default-fingerprints&lt;BR /&gt;!&lt;BR /&gt;ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"&lt;BR /&gt;permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit D HCP replies"&lt;BR /&gt;deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-descriptio n "deny windows netbios"&lt;BR /&gt;deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast"&lt;BR /&gt;deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP l ocal broadcast"&lt;BR /&gt;permit ip any any rule-precedence 100 rule-description "permit all IP traffic"&lt;BR /&gt;!&lt;BR /&gt;mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt;permit any any type ip rule-precedence 10 rule-description "permit all IPv4 tra ffic"&lt;BR /&gt;permit any any type arp rule-precedence 20 rule-description "permit all ARP tra ffic"&lt;BR /&gt;!&lt;BR /&gt;ip snmp-access-list default&lt;BR /&gt;permit any&lt;BR /&gt;!&lt;BR /&gt;firewall-policy default&lt;BR /&gt;no ip dos tcp-sequence-past-window&lt;BR /&gt;no stateful-packet-inspection-l2&lt;BR /&gt;ip tcp adjust-mss 1400&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mint-policy global-default&lt;BR /&gt;!&lt;BR /&gt;meshpoint-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;wlan-qos-policy &amp;lt;wifi-name&amp;gt;&lt;BR /&gt;rate-limit client to-air rate 5000&lt;BR /&gt;rate-limit client from-air rate 5000&lt;BR /&gt;qos trust dscp&lt;BR /&gt;qos trust wmm&lt;BR /&gt;!&lt;BR /&gt;wlan-qos-policy default&lt;BR /&gt;qos trust dscp&lt;BR /&gt;qos trust wmm&lt;BR /&gt;!&lt;BR /&gt;radio-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;association-acl-policy &amp;lt;wifi-network&amp;gt;&lt;BR /&gt;permit &amp;lt;mac-address&amp;gt; precedence 2&lt;BR /&gt;permit &amp;lt;mac-address&amp;gt; precedence 3&lt;BR /&gt;permit &amp;lt;mac-address&amp;gt; precedence 4&lt;BR /&gt;permit &amp;lt;mac-address&amp;gt; precedence 5&lt;BR /&gt;permit &amp;lt;mac-address&amp;gt; precedence 6&lt;BR /&gt;(repeat-lines-omitted)&lt;BR /&gt;!&lt;BR /&gt;wlan &amp;lt;wifi-name&amp;gt;&lt;BR /&gt;ssid &amp;lt;wifi-name&amp;gt;&lt;BR /&gt;vlan 1&lt;BR /&gt;bridging-mode local&lt;BR /&gt;encryption-type &amp;lt;omitted&amp;gt;&lt;BR /&gt;authentication-type none&lt;BR /&gt;no client-client-communication&lt;BR /&gt;no fast-bss-transition over-ds&lt;BR /&gt;wpa-wpa2 psk 0 &amp;lt;key&amp;gt;&lt;BR /&gt;accounting syslog host &amp;lt;syslog-server-ip&amp;gt; port &amp;lt;port&amp;gt;&lt;BR /&gt;use wlan-qos-policy &amp;lt;wifi-name&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;wips-policy default&lt;BR /&gt;!&lt;BR /&gt;auto-provisioning-policy default&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;management-policy default&lt;BR /&gt;no telnet&lt;BR /&gt;no http server&lt;BR /&gt;https server&lt;BR /&gt;ssh&lt;BR /&gt;user admin password &amp;lt;password&amp;gt; role superuser access all&lt;BR /&gt;snmp-server community 0 private rw&lt;BR /&gt;snmp-server community 0 public ro&lt;BR /&gt;snmp-server user snmptrap v3 encrypted des auth md5 0 &amp;lt;password&amp;gt;&lt;BR /&gt;snmp-server user snmpmanager v3 encrypted des auth md5 &amp;lt;password&amp;gt;&lt;BR /&gt;!&lt;BR /&gt;event-system-policy default&lt;BR /&gt;!&lt;BR /&gt;nsight-policy default&lt;BR /&gt;!&lt;BR /&gt;profile ap7522 default-ap7522&lt;BR /&gt;use enterprise-ui&lt;BR /&gt;autoinstall configuration&lt;BR /&gt;autoinstall firmware&lt;BR /&gt;crypto ikev1 policy ikev1-default&lt;BR /&gt;isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt;crypto ikev2 policy ikev2-default&lt;BR /&gt;isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt;crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;crypto ikev1 remote-vpn&lt;BR /&gt;crypto ikev2 remote-vpn&lt;BR /&gt;crypto auto-ipsec-secure&lt;BR /&gt;crypto load-management&lt;BR /&gt;crypto remote-vpn-client&lt;BR /&gt;interface radio1&lt;BR /&gt;wlan &amp;lt;wifi-name&amp;gt; bss 1 primary&lt;BR /&gt;interface radio2&lt;BR /&gt;wlan &amp;lt;wifi-name&amp;gt; bss 1 primary&lt;BR /&gt;interface ge1&lt;BR /&gt;interface vlan1&lt;BR /&gt;ip address dhcp&lt;BR /&gt;ip address zeroconf secondary&lt;BR /&gt;ip dhcp client request options all&lt;BR /&gt;interface pppoe1&lt;BR /&gt;use event-system-policy default&lt;BR /&gt;use firewall-policy default&lt;BR /&gt;ntp server 138.236.128.36 autokey&lt;BR /&gt;use client-identity-group default&lt;BR /&gt;logging on&lt;BR /&gt;service pm sys-restart&lt;BR /&gt;router ospf&lt;BR /&gt;!&lt;BR /&gt;rf-domain default&lt;BR /&gt;location &amp;lt;location&amp;gt;&lt;BR /&gt;contact &amp;lt;admin&amp;gt;&lt;BR /&gt;timezone America/Chicago&lt;BR /&gt;country-code us&lt;BR /&gt;use nsight-policy default&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP2&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP2&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;interface vlan1&lt;BR /&gt;description "primary domain"&lt;BR /&gt;ip address &amp;lt;ip-address-AP2&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP3&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP3&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;interface vlan1&lt;BR /&gt;ip address &amp;lt;IP address-AP3&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;macaddress-AP4&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP4&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;ip default-gateway &amp;lt;gateway-ip&amp;gt;&lt;BR /&gt;interface vlan1&lt;BR /&gt;ip address &amp;lt;ip-address-AP4&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 ,&amp;lt;mac-address-AP5&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP5&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;ip name-server &amp;lt;name-server-IP&amp;gt;&lt;BR /&gt;interface vlan1&lt;BR /&gt;description "main network"&lt;BR /&gt;ip address &amp;lt;ip-address-AP5&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP6&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname&amp;lt;hostname-AP6&amp;gt;&lt;/P&gt;&lt;P&gt;location default&lt;BR /&gt;no adoption-mode&lt;BR /&gt;interface vlan1&lt;BR /&gt;description "main network"&lt;BR /&gt;ip address &amp;lt;ip-address-AP6&amp;gt;/24&lt;BR /&gt;use auto-provisioning-policy default&lt;BR /&gt;virtual-controller&lt;BR /&gt;rf-domain-manager capable&lt;BR /&gt;logging buffered informational&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP7&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP7&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;interface vlan1&lt;BR /&gt;ip address &amp;lt;ip-address-AP7&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP8&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP8&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;interface vlan1&lt;BR /&gt;no description&lt;BR /&gt;ip address &amp;lt;ip-address-AP8&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;ap7522 &amp;lt;mac-address-AP9&amp;gt;&lt;BR /&gt;use profile default-ap7522&lt;BR /&gt;use rf-domain default&lt;BR /&gt;hostname &amp;lt;hostname-AP9&amp;gt;&lt;BR /&gt;location default&lt;BR /&gt;interface vlan1&lt;BR /&gt;description "main network"&lt;BR /&gt;ip address &amp;lt;ip-address-AP9&amp;gt;/24&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Fri, 17 Nov 2023 22:13:47 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/weseverity-0-emergency-acct-stop-message-in-syslog/m-p/98000#M9323</guid>
      <dc:creator>cwensink</dc:creator>
      <dc:date>2023-11-17T22:13:47Z</dc:date>
    </item>
  </channel>
</rss>

