zlog_* cleanup. Level of debug messages to LOG_DEBUG.
diff --git a/isisd/isis_network.c b/isisd/isis_network.c
index a1dc582..ed732cc 100644
--- a/isisd/isis_network.c
+++ b/isisd/isis_network.c
@@ -121,11 +121,11 @@
       mreq.mr_type = PACKET_MR_ALLMULTI;
     }
 #ifdef EXTREME_DEBUG
-  zlog_info ("isis_multicast_join(): fd=%d, reg_to=%d, if_num=%d, "
-	     "address = %02x:%02x:%02x:%02x:%02x:%02x",
-	     fd, registerto, if_num, mreq.mr_address[0], mreq.mr_address[1],
-	     mreq.mr_address[2], mreq.mr_address[3], mreq.mr_address[4],
-	     mreq.mr_address[5]);
+  zlog_debug ("isis_multicast_join(): fd=%d, reg_to=%d, if_num=%d, "
+	      "address = %02x:%02x:%02x:%02x:%02x:%02x",
+	      fd, registerto, if_num, mreq.mr_address[0], mreq.mr_address[1],
+	      mreq.mr_address[2], mreq.mr_address[3], mreq.mr_address[4],
+	      mreq.mr_address[5]);
 #endif /* EXTREME_DEBUG */
   if (setsockopt (fd, SOL_PACKET, PACKET_ADD_MEMBERSHIP, &mreq,
 		  sizeof (struct packet_mreq)))
@@ -226,7 +226,7 @@
       return ISIS_WARNING;
     }
 
-  zlog_info ("Opened BPF device %s", bpfdev);
+  zlog_debug ("Opened BPF device %s", bpfdev);
 
   memcpy (ifr.ifr_name, circuit->interface->name, sizeof (ifr.ifr_name));
   if (ioctl (fd, BIOCSETIF, (caddr_t) & ifr) < 0)
@@ -247,7 +247,7 @@
   if (readbuff == NULL)
     readbuff = malloc (blen);
 
-  zlog_info ("BPF buffer len = %u", blen);
+  zlog_debug ("BPF buffer len = %u", blen);
 
   /*  BPF(4): reads return immediately upon packet reception.
    *  Otherwise, a read will block until either the kernel