Configuring System Message Logging
|
|
|
- Geoffrey Hodges
- 9 years ago
- Views:
Transcription
1 This chapter describes how to configure system message logging on the Cisco Nexus 5000 Series switch and contains the following sections: Information About System Message Logging, page 1, page 2 Verifying System Message Logging Configuration, page 13 Default System Message Logging Settings, page 14 Information About System Message Logging You can use system message logging to control the destination and to filter the severity level of messages that system processes generate. You can configure logging to terminal sessions, a log file, and syslog servers on remote systems. By default, the Cisco Nexus 5000 Series switch outputs messages to terminal sessions. By default, the switch logs system messages to a log file. The following table describes the severity levels used in system messages. When you configure the severity level, the system outputs messages at that level and lower. Table 1: System Message Severity Levels Level 0 emergency 1 alert 2 critical 3 error 4 warning Description System unusable Immediate action needed Critical condition Error condition Warning condition OL
2 syslog Servers Level 5 notification 6 informational 7 debugging Description Normal but significant condition Informational message only Appears during debugging only syslog Servers The switch logs the most recent 100 messages of severity 0, 1, or 2 to the NVRAM log. You cannot configure logging to the NVRAM. You can configure which system messages should be logged based on the facility that generated the message and its severity level. Related Topics Configuring Module and Facility Messages Logging, page 6 to a File, page 5 to Terminal Sessions, page 2 syslog servers run on remote systems that are configured to log system messages based on the syslog protocol. You can configure the Cisco Nexus 5000 Series to sends its logs to up to three syslog servers. To support the same configuration of syslog servers on all switches in a fabric, you can use the Cisco Fabric Services (CFS) to distribute the syslog server configuration. Note When the switch first initializes, messages are sent to syslog servers only after the network is initialized. to Terminal Sessions You can configure the switch to log messages by their severity level to console, Telnet, and SSH sessions. By default, logging is enabled for terminal sessions. 2 OL
3 SUMMARY STEPS 1. switch# terminal monitor switch(config)# logging console [severity-level] 4. switch(config)# no logging console [severity-level] 5. switch(config)# logging monitor [severity-level] 6. switch(config)# no logging monitor [severity-level] 7. switch# show logging console 8. switch# show logging monitor 9. switch# copy running-config startup-config DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 switch# terminal monitor switch(config)# logging console [severity-level] switch(config)# no logging console [severity-level] switch(config)# logging monitor [severity-level] Copies syslog messages from the console to the current terminal session. Enters configuration mode. Enables the switch to log messages to the console session based on a specified severity level or higher (a lower number value indicates a higher severity level). Severity levels range from 0 to 7: 0 emergency 1 alert 2 critical 3 error 4 warning 5 notification 6 informational 7 debugging If the severity level is not specified, the default of 2 is used. Disables logging messages to the console. Enables the switch to log messages to the monitor based on a specified severity level or higher (a lower number value indicates a higher severity level). Severity levels range from 0 to 7: 0 emergency 1 alert 2 critical OL
4 3 error 4 warning 5 notification 6 informational 7 debugging Step 6 Step 7 Step 8 Step 9 switch(config)# no logging monitor [severity-level] switch# show logging console switch# show logging monitor switch# copy running-config startup-config If the severity level is not specified, the default of 2 is used. The configuration applies to Telnet and SSH sessions. Disables logging messages to telnet and SSH sessions. Displays the console logging configuration. Displays the monitor logging configuration. Copies the running configuration to the startup configuration. The following example shows how to configure a logging level of 3 for the console: switch(config)# logging console 3 The following example shows how to display the console logging configuration: switch# show logging console Logging console: enabled (Severity: error) The following example shows how to disable logging for the console: switch(config)# no logging console The following example shows how to configure a logging level of 4 for the terminal session: switch# terminal monitor switch(config)# logging monitor 4 The following example shows how to display the terminal session logging configuration: switch# show logging monitor Logging monitor: enabled (Severity: warning) The following example shows how to disable logging for the terminal session: switch(config)# no logging monitor 4 OL
5 to a File to a File SUMMARY STEPS You can configure the switch to log system messages to a file. By default, system messages are logged to the file log:messages switch(config)# logging logfile logfile-name severity-level [size bytes] 3. switch(config)# no logging logfile [logfile-name severity-level [size bytes]] 4. switch# show logging info 5. switch# copy running-config startup-config DETAILED STEPS Step 1 Enters configuration mode. Step 2 switch(config)# logging logfile logfile-name severity-level [size bytes] Configures the name of the log file used to store system messages and the minimum severity level to log. You can optionally specify a maximum file size. The default severity level is 5 and the file size is Severity levels range from 0 to 7: 0 emergency 1 alert 2 critical 3 error 4 warning 5 notification 6 informational 7 debugging Step 3 Step 4 switch(config)# no logging logfile [logfile-name severity-level [size bytes]] switch# show logging info The file size is from 4096 to bytes. Disables logging to the log file. Displays the logging configuration. Step 5 switch# copy running-config startup-config Copies the running configuration to the startup configuration. OL
6 Configuring Module and Facility Messages Logging The following example shows how to configure a switch to log system messages to a file: switch(config)# logging logfile my_log 6 size The following example shows how to display the logging configuration (some of the output has been removed for brevity): switch# show logging info Logging console: enabled (Severity: debugging) Logging monitor: enabled (Severity: debugging) Logging linecard: enabled (Severity: notifications) Logging fex: enabled (Severity: notifications) Logging timestamp: Seconds Logging server: disabled Logging logfile: enabled Name - my_log: Severity - informational Size Facility Default Severity Current Session Severity aaa 3 3 aclmgr 3 3 afm 3 3 altos 3 3 auth 0 0 authpriv 3 3 bootvar 5 5 callhome 2 2 capability 2 2 cdp 2 2 cert_enroll Related Topics Displaying and Clearing Log Files, page 13 Configuring Module and Facility Messages Logging You can configure the severity level and time-stamp units of messages logged by modules and facilities. SUMMARY STEPS switch(config)# logging module [severity-level] 3. switch(config)# logging level facility severity-level 4. switch(config)# no logging module [severity-level] 5. switch(config)# no logging level [facility severity-level] 6. switch# show logging module 7. switch# show logging level [facility] 8. switch# copy running-config startup-config DETAILED STEPS Step 1 Enters configuration mode. 6 OL
7 Step 2 Step 3 Step 4 switch(config)# logging module [severity-level] switch(config)# logging level facility severity-level switch(config)# no logging module [severity-level] Enables module log messages that have the specified severity level or higher. Severity levels range from 0 to 7: 0 emergency 1 alert 2 critical 3 error 4 warning 5 notification 6 informational 7 debugging If the severity level is not specified, the default of 5 is used. Enables logging messages from the specified facility that have the specified severity level or higher. Severity levels from 0 to 7: 0 emergency 1 alert 2 critical 3 error 4 warning 5 notification 6 informational 7 debugging To apply the same severity level to all facilities, use the all facility. For defaults, see the show logging level command. Disables module log messages. Step 5 switch(config)# no logging level [facility severity-level] Resets the logging severity level for the specified facility to its default level. If you do not specify a facility and severity level, the switch resets all facilities to their default levels. Step 6 switch# show logging module Displays the module logging configuration. OL
8 Configuring Logging Timestamps Step 7 Step 8 switch# show logging level [facility] switch# copy running-config startup-config Displays the logging level configuration and the system default level by facility. If you do not specify a facility, the switch displays levels for all facilities. Copies the running configuration to the startup configuration. The following example shows how to configure the severity level of module and specific facility messages: switch(config)# logging module 3 switch(config)# logging level aaa 2 Configuring Logging Timestamps You can configure the time-stamp units of messages logged by the Cisco Nexus 5000 Series switch. SUMMARY STEPS switch(config)# logging timestamp {microseconds milliseconds seconds} 3. switch(config)# no logging timestamp {microseconds milliseconds seconds} 4. switch# show logging timestamp 5. switch# copy running-config startup-config DETAILED STEPS Step 1 Step 2 switch(config)# logging timestamp {microseconds milliseconds seconds} Enters configuration mode. Sets the logging time-stamp units. By default, the units are seconds. Step 3 switch(config)# no logging timestamp {microseconds milliseconds seconds} Resets the logging time-stamp units to the default of seconds. Step 4 Step 5 switch# show logging timestamp switch# copy running-config startup-config Displays the logging time-stamp units configured. Copies the running configuration to the startup configuration. 8 OL
9 Configuring syslog Servers The following example shows how to configure the time-stamp units of messages: switch(config)# logging timestamp milliseconds switch(config)# exit switch# show logging timestamp Logging timestamp: Milliseconds Configuring syslog Servers SUMMARY STEPS You can configure up to three syslog servers that reference remote systems where you want to log system messages switch(config)# logging server host [severity-level [use-vrf vrf-name [facility facility]]] 3. switch(config)# no logging server host 4. switch# show logging server 5. switch# copy running-config startup-config DETAILED STEPS Step 1 Step 2 switch(config)# logging server host [severity-level [use-vrf vrf-name [facility facility]]] Enters configuration mode. Configures a host to receive syslog messages. The host argument identifies the host name or the IPv4 or IPv6 address of the syslog server host. The severity-level argument limits the logging of messages to the syslog server to a specified level. Severity levels range from 0 to 7. Refer to Table 1: System Message Severity Levels, page 1 The use vrf vrf-name keyword argument identifies the default or management values for the VRF name. If a specific VRF is not identified, management is the default. However, if management is configured, it will not be listed in the output of the show-running command because it is the default. If a specific VRF is configured, the show-running command output will list the VRF for each server. Note The current CFS distribution does not support VRF. If CFS distribution is enabled, then the logging server configured with the default VRF will be distributed as the management VRF. The facility argument names the syslog facility type. The facilities are listed in the Cisco Nexus 5000 Series Command Reference. The default outgoing facility is local7. OL
10 Configuring syslog on a UNIX or Linux System Step 3 Step 4 Step 5 switch(config)# no logging server host switch# show logging server switch# copy running-config startup-config Removes the logging server for the specified host. Displays the syslog server configuration. Copies the running configuration to the startup configuration. The following examples show how to configure a syslog server: switch(config)# logging server use-vrf default facility local3 switch(config)# logging server use-vrf mgmt0 facility local3 Table 2: Related Commands Command show logging server Descriptions Displays the configured syslog servers. Configuring syslog on a UNIX or Linux System You can configure a syslog server on a UNIX or Linux system by adding the following line to the /etc/syslog.conf file: facility.level <five tab characters> action The following table describes the syslog fields that you can configure. Table 3: syslog Fields in syslog.conf Field Facility Level Description Creator of the message, which can be auth, authpriv, cron, daemon, kern, lpr, mail, mark, news, syslog, user, local0 through local7, or an asterisk (*) for all. These facility designators allow you to control the destination of messages based on their origin. Note Check your configuration before using a local facility. Minimum severity level at which messages are logged, which can be debug, info, notice, warning, err, crit, alert, emerg, or an asterisk (*) for all. You can use none to disable a facility. 10 OL
11 Configuring syslog Server Configuration Distribution Configuring syslog on a UNIX or Linux System Field Action Description Destination for messages, which can be a filename, a host name preceded by the at sign (@), or a comma-separated list of users or an asterisk (*) for all logged-in users. SUMMARY STEPS 1. Log debug messages with the local7 facility in the file /var/log/myfile.log by adding the following line to the /etc/syslog.conf file: 2. Create the log file by entering these commands at the shell prompt: 3. Make sure the system message logging daemon reads the new changes by checking myfile.log after entering this command: DETAILED STEPS Step 1 Step 2 Step 3 Log debug messages with the local7 facility in the file /var/log/myfile.log by adding the following line to the /etc/syslog.conf file: debug.local7 /var/log/myfile.log Create the log file by entering these commands at the shell prompt: $ touch /var/log/myfile.log $ chmod 666 /var/log/myfile.log Make sure the system message logging daemon reads the new changes by checking myfile.log after entering this command: $ kill -HUP ~cat /etc/syslog.pid~ Configuring syslog Server Configuration Distribution You can distribute the syslog server configuration to other switches in the network by using the Cisco Fabric Services (CFS) infrastructure. After you enable syslog server configuration distribution, you can modify the syslog server configuration and view the pending changes before committing the configuration for distribution. As long as distribution is enabled, the switch maintains pending changes to the syslog server configuration. Note If the switch is restarted, the syslog server configuration changes that are kept in volatile memory may be lost. Before You Begin You must have configured one or more syslog servers. OL
12 Configuring syslog on a UNIX or Linux System SUMMARY STEPS switch(config)# logging distribute 3. switch(config)# logging commit 4. switch(config)# logging abort 5. switch(config)# no logging distribute 6. switch# show logging pending 7. switch# show logging pending-diff 8. switch# show logging internal info 9. switch# copy running-config startup-config DETAILED STEPS Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 switch(config)# logging distribute switch(config)# logging commit switch(config)# logging abort switch(config)# no logging distribute switch# show logging pending switch# show logging pending-diff switch# show logging internal info switch# copy running-config startup-config Enters configuration mode. Enables distribution of syslog server configuration to network switches using the CFS infrastructure. By default, distribution is disabled. Commits the pending changes to the syslog server configuration for distribution to the switches in the fabric. Cancels the pending changes to the syslog server configuration. Disables distribution of syslog server configuration to network switches using the CFS infrastructure. You cannot disable distribution when configuration changes are pending. See the logging commit and logging abort commands. By default, distribution is disabled. Displays the pending changes to the syslog server configuration. Displays the differences from the current syslog server configuration to the pending changes of the syslog server configuration. Displays information about the current state of syslog server distribution and the last action taken. Copies the running configuration to the startup configuration. Related Topics Information About CFS 12 OL
13 Displaying and Clearing Log Files Verifying System Message Logging Configuration Displaying and Clearing Log Files You can display or clear messages in the log file and the NVRAM. SUMMARY STEPS 1. switch# show logging last number-lines 2. switch# show logging logfile [start-time yyyy mmm dd hh:mm:ss] [end-time yyyy mmm dd hh:mm:ss] 3. switch# show logging nvram [last number-lines] 4. switch# clear logging logfile 5. switch# clear logging nvram DETAILED STEPS Step 1 switch# show logging last number-lines Displays the last number of lines in the logging file. You can specify from 1 to 9999 for the last number of lines. Step 2 switch# show logging logfile [start-time yyyy mmm dd hh:mm:ss] [end-time yyyy mmm dd hh:mm:ss] Displays the messages in the log file that have a time stamp within the span entered. If you do not enter an end time, the current time is used. You enter three characters for the month time field, and digits for the year and day time fields. Step 3 Step 4 Step 5 switch# show logging nvram [last number-lines] switch# clear logging logfile switch# clear logging nvram Displays the messages in the NVRAM. To limit the number of lines displayed, you can enter the last number of lines to display. You can specify from 1 to 100 for the last number of lines. Clears the contents of the log file. Clears the logged messages in NVRAM. The following example shows how to display messages in a log file: switch# show logging last 40 switch# show logging logfile start-time 2007 nov 1 15:10:0 switch# show logging nvram last 10 The following example shows how to clear messages in a log file: switch# clear logging logfile switch# clear logging nvram Verifying System Message Logging Configuration To display system message logging configuration information, perform one of the following tasks: Command switch# show logging console Displays the console logging configuration. OL
14 Default System Message Logging Settings Command switch# show logging info switch# show logging internal info switch# show logging last number-lines switch# show logging level [facility] switch# show logging logfile [start-time yyyy mmm dd hh:mm:ss] [end-time yyyy mmm dd hh:mm:ss] switch# show logging module switch# show logging monitor switch# show logging nvram [last number-lines] switch# show logging pending switch# show logging pending-diff switch# show logging server switch# show logging session switch# show logging status switch# show logging timestamp Displays the logging configuration. Displays the syslog distribution information. Displays the last number of lines of the log file. Displays the facility logging severity level configuration. Displays the messages in the log file. Displays the module logging configuration. Displays the monitor logging configuration. Displays the messages in the NVRAM log. Displays the syslog server pending distribution configuration. Displays the syslog server pending distribution configuration differences. Displays the syslog server configuration. Displays the logging session status. Displays the logging status. Displays the logging time-stamp units configuration. Default System Message Logging Settings The following table lists the default settings for system message logging parameters. Table 4: Default System Message Logging Parameters Parameters Console logging Monitor logging Log file logging Module logging Default Enabled at severity level 2 Enabled at severity level 2 Enabled to log:messages at severity level 5 Enabled at severity level 5 14 OL
15 Default System Message Logging Settings Parameters Facility logging Time-stamp units syslog server logging syslog server configuration distribution Default Enabled; Seconds Disabled Disabled OL
16 Default System Message Logging Settings 16 OL
Configuring System Message Logging
CHAPTER 5 This chapter describes how to configure system message logging on Cisco NX-OS devices. This chapter includes the following sections: Information About System Message Logging, page 5-1 Licensing
Configuring System Message Logging
CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco
System Message Logging
System Message Logging This module describes how to configure system message logging on your wireless device in the following sections: Understanding System Message Logging, page 1 Configuring System Message
Configuring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
NAS 272 Using Your NAS as a Syslog Server
NAS 272 Using Your NAS as a Syslog Server Enable your NAS as a Syslog Server to centrally manage the logs from all network devices A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
Network Monitoring. SAN Discovery and Topology Mapping. Device Discovery. Topology Mapping. Send documentation comments to [email protected].
32 CHAPTER The primary purpose of Fabric Manager is to manage the network. In particular, SAN discovery and network monitoring are two of its key network management capabilities. This chapter contains
Configuring SSH and Telnet
This chapter describes how to configure Secure Shell Protocol (SSH) and Telnet on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About
Configuring NTP. Information About NTP. NTP Overview. Send document comments to [email protected]. CHAPTER
3 CHAPTER This chapter describes how to configure the Network Time Protocol (NTP) on Cisco NX-OS devices. This chapter includes the following sections: Information About NTP, page 3-1 Licensing Requirements
Network Monitoring & Management Log Management
Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Lab 5.5 Configuring Logging
Lab 5.5 Configuring Logging Learning Objectives Configure a router to log to a Syslog server Use Kiwi Syslog Daemon as a Syslog server Configure local buffering on a router Topology Diagram Scenario In
Syslog & xinetd. Stephen Pilon
Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and
Lab 11.5.6.1 Configure Syslog on AP
Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor
Configuring Password Encryption
This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About Password Encryption,
Using Debug Commands
Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using the debug?
Using Debug Commands
CHAPTER 1 Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using
Linux System Administration. System Administration Tasks
System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,
Monitoring the Firewall Services Module
24 CHAPTER This chapter describes how to configure logging and SNMP for the FWSM. It also describes the contents of system log messages and the system log message format. This chapter does not provide
Network Monitoring & Management Log Management
Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Using Debug Commands
C H A P T E R 1 Using Debug Commands This chapter explains how you can use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug
Configuring Syslog Server on Cisco Routers with Cisco SDM
Configuring Syslog Server on Cisco Routers with Cisco SDM Syslog is a standard for forwarding log messages in an Internet Protocol (IP) computer network. It allows separation of the software that generates
Configuring Password Encryption
This chapter describes how to configure password encryption on Cisco NX-OS devices. This chapter includes the following sections: Information About Password Encryption, page 1 Licensing Requirements for
Cisco Setting Up PIX Syslog
Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring
Network Monitoring & Management Log Management
Network Monitoring & Management Log Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Syslog
Send document comments to [email protected].
CHAPTER 4 This chapter describes how to configure the Domain Name Server (DNS) client. This chapter includes the following sections: Information About DNS Clients, page 4-1 Licensing Requirements for DNS
Connecting to the Firewall Services Module and Managing the Configuration
CHAPTER 3 Connecting to the Firewall Services Module and This chapter describes how to access the command-line interface and work with the configuration. This chapter includes the following sections: Connecting
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
Presented by Henry Ng
Log Format Presented by Henry Ng 1 Types of Logs Content information, alerts, warnings, fatal errors Source applications, systems, drivers, libraries Format text, binary 2 Typical information in Logs Date
3.1 Connecting to a Router and Basic Configuration
3.1 Connecting to a Router and Basic Configuration Objective This lab will focus on the ability to connect a PC to a router in order to establish a console session and observe the user interface. A console
Configuring ECMP for Host Routes
CHAPTER 8 This chapter describes how to configure the equal-cost multipathing (ECMP) protocol for host routes on the Cisco NX-OS switch. This chapter includes the following sections: Information About
Configuring NTP. Information about NTP. NTP Overview. Send document comments to [email protected]. CHAPTER
CHAPTER 8 This chapter describes how to configure the Network Time Protocol (NTP) and includes the following topics: Information about NTP, page 8-1 Prerequisites for NTP, page 8-3 Configuration Guidelines
Security Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
NTP and Syslog in Linux. Kevin Breit
NTP and Syslog in Linux Kevin Breit Network Time Protocol (NTP) Synchronizes computer time with highly accurate time services NTP Architecture Utilizes time server hierarchy. Each level is called a stratum.
Planning Maintenance for Complex Networks
Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Olga Torstensson TSHOOT v6 1 Maintenance Models and Methodologies A network engineer s job description
Configuring LocalDirector Syslog
Configuring LocalDirector Syslog Document ID: 22178 LocalDirector is now End of Sale. Refer to the Cisco LocalDirector 400 Series bulletins for more information. Contents Introduction Before You Begin
EMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N 300-015-126 Rev 01 August, 2013
EMC VNX Version 8.1 Configuring and Using the Audit Tool on VNX for File P/N 300-015-126 Rev 01 August, 2013 This technical note contains information on these topics: Executive summary... 2 Introduction...
Cisco IOS Embedded Syslog Manager Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
Enabling Remote Access to the ACE
CHAPTER 2 This chapter describes how to configure remote access to the Cisco Application Control Engine (ACE) module by establishing a remote connection by using the Secure Shell (SSH) or Telnet protocols.
Red Condor Syslog Server Configurations
Red Condor Syslog Server Configurations May 2008 2 Red Condor Syslog Server Configurations This application note describes the configuration and setup of a syslog server for use with the Red Condor mail
Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter 1 2007 2010, Cisco Systems, Inc. All rights reserved.
: Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks TSHOOT v6 1 Objectives Evaluate commonly-practiced models and methodologies for network maintenance
Users Manual OP5 Logserver 1.2.1
Users Manual OP5 Logserver 1.2.1 Copyright(C) 2003-2005 OP5 AB, www.op5.se Page 1 of 13 Table of Contents Users Manual...1 OP5 Logserver 1.2.1...1 Introduction... 3 Who is this manual for... 3 Syslog protocol...
Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to [email protected]. CHAPTER
CHAPTER 19 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 19-1 Licensing Requirements
Security Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
Lab 2.3.3 Configure Intrusion Prevention on the PIX Security Appliance
Lab 2.3.3 Configure Intrusion Prevention on the PIX Security Appliance Objective Scenario Topology In this lab exercise, the students will complete the following tasks: Configure the use of Cisco Intrusion
Objectives Understand Cisco IOS system architecture components. Work with the Cisco IOS Command Line Interface (CLI) and common commands.
Objectives Understand Cisco IOS system architecture components. Work with the Cisco IOS Command Line Interface (CLI) and common commands. Learn about Cisco IOS troubleshooting techniques. Understand upgrading
How To Configure Rmon On Cisco Me 2600X On Ios 2.5A (Cisco) With A Network Monitor On A Network Device (Network) On A Pnet 2.2.1 (Network Monitor) On An Ip
Remote Network Monitoring and Alarm Troubleshooting This chapter describes remote network monitoring (RMON) and alarm troubleshooting. RMON Procedures, page 1 Understanding RMON, page 1 Alarm Troubleshooting,
Syslog Monitoring Feature Pack
AdventNet Web NMS Syslog Monitoring Feature Pack A dventnet, Inc. 5645 G ibraltar D rive Pleasanton, C A 94588 USA P ho ne: +1-925-924-9500 Fa x : +1-925-924-9600 Em ail:[email protected] http://www.adventnet.com
Topics. CIT 470: Advanced Network and System Administration. Logging Policies. System Logs. Throwing Away. How to choose a logging policy?
Topics CIT 470: Advanced Network and System Administration Logging 1. System logs 2. Logging policies 3. Finding logs 4. Syslog 5. Syslog servers 6. Log monitoring CIT 470: Advanced Network and System
IPv6 Diagnostic and Troubleshooting
8 IPv6 Diagnostic and Troubleshooting Contents Introduction.................................................. 8-2 ICMP Rate-Limiting........................................... 8-2 Ping for IPv6 (Ping6)..........................................
Basic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.
VYATTA, INC. Vyatta System Basic System REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com
CSE/ISE 311: Systems Administra5on Logging
Logging Por$ons courtesy Ellen Liu Outline Introduc$on Finding log files Syslog: the system event logger Linux logrotate tool Condensing log files to useful informa$on Logging policies 13-2 Who and Why
Configuring NetFlow. Information About NetFlow. Send document comments to [email protected]. CHAPTER
CHAPTER 11 Use this chapter to configure NetFlow to characterize IP traffic based on its source, destination, timing, and application information, to assess network availability and performance. This chapter
File Transfers. Contents
A File Transfers Contents Overview..................................................... A-2................................... A-2 General Switch Software Download Rules..................... A-3 Using
Managing Storage Services Modules
CHAPTER 3 This chapter describes how to manage the Storage Services Module (SSM) and provides information about SSI images. This chapter includes the following sections: SSM Overview, page 3-1 Initial
Configuring Role-Based Access Control
5 CHAPTER This chapter describes how to configure role-based access control (RBAC) on the Cisco Application Control Engine (ACE) module. This chapter contains the following sections: Information About
SYSLOG 1 Overview... 1 Syslog Events... 1 Syslog Logs... 4 Document Revision History... 5
Syslog SYSLOG 1 Overview... 1 Syslog Events... 1 Syslog Logs... 4 Document Revision History... 5 Overview Syslog messages are event messages and alerts that are sent by the operating system, applications
Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to [email protected]. CHAPTER
CHAPTER 16 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 16-1 Licensing Requirements
Linux Syslog Messages in IBM Director
Ever want those pesky little Linux syslog messages (/var/log/messages) to forward to IBM Director? Well, it s not built in, but it s pretty easy to setup. You can forward syslog messages from an IBM Director
Implementing Secure Shell
Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms, and the application
RSA Event Source Configuration Guide. McAfee Firewall Enterprise
Configuration Guide McAfee Firewall Enterprise Last Modified: Wednesday, October 24, 2012 Event Source (Device) Product Information Vendor McAfee Event Source (Device) Firewall Enterprise (formerly Secure
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Router Security Audit Logs
Router Security Audit Logs The Router Security Audit Logs feature allows users to configure audit trails, which track changes that have been made to a router that is running Cisco IOS software. History
Enterprise Content Management System Monitor. Server Debugging Guide. 20.09.2013 CENIT AG Bettighofer, Stefan
Enterprise Content Management System Monitor Server Debugging Guide 20.09.2013 CENIT AG Bettighofer, Stefan 1 Table of Contents 1 Table of Contents... 2 2 Overview... 3 3 The Server Status View... 3 4
Router Lab Reference Guide
Router Lab Reference Guide 1 PURPOSE AND GOALS The routing lab allows testing different IP-related protocols and solutions in a close to live environment. You can learn how to configure Cisco routers and
Using LiveAction with Cisco Secure ACS (TACACS+ Server)
LiveAction Application Note Using LiveAction with Cisco Secure ACS (TACACS+ Server) September 2012 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. Cisco Router Configuration... 2
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/
Computer Security DD2395 http://www.csc.kth.se/utbildning/kth/kurser/dd2395/dasakh10/ Fall 2010 Sonja Buchegger [email protected] Lecture 13, Dec. 6, 2010 Auditing Security Audit an independent review and examination
Knowledge Base Articles
Knowledge Base Articles 2005 Jalasoft Corp. All rights reserved. TITLE: How to configure and use the Jalasoft Xian Syslog Server. REVISION: Revision : B001-SLR01 Date : 11/30/05 DESCRIPTION: Jalasoft has
Cisco Nexus 5548UP. Switch Configuration Guide for Dell PS Series SANs. A Dell Deployment and Configuration Guide
Cisco Nexus 5548UP Switch Configuration Guide for Dell PS Series SANs Dell Storage Engineering October 2015 A Dell Deployment and Configuration Guide Revisions Date February 2013 October 2013 March 2014
Lab 4.2.4 Advanced Telnet Operations
Lab 4.2.4 Advanced Telnet Operations Objective Use the telnet command to remotely access other routers. Verify that the application layer between the source and the destination is working properly. Suspend
syslog - centralized logging
syslog - centralized logging David Morgan A logging system Conforming programs emit categorized messages Messages are candidates for logging syslog handles the logging performed by syslogd per /etc/syslog.conf
Image Verification. Finding Feature Information. Restrictions for Image Verification
The feature allows users to automatically verify the integrity of Cisco IOS images. Thus, users can be sure that the image is protected from accidental corruption, which can occur at any time during transit,
Logging with syslog-ng, Part One
Logging with syslog-ng, Part One By Line Forrest Hoffman Used properly, system logs are like the pulse of a system. A log can often explain sources of configuration problems or foretell of impending hardware
Configuring the Scheduler
CHAPTER 10 This chapter describes how to configure the scheduler on Cisco NX-OS devices. This chapter includes the following sections: Information About the Scheduler, page 10-1 Licensing Requirements
Alert Logic Log Manager
whitepaper Alert Logic Log Manager Configuring Log Sources for Best Practice Reports CONTENTS Introduction 1 Best Practice Reports in Log Manager 2 Active Directory 2 Databases 2 Network Devices 2 Windows
Configuring the Firewall Management Interface
Configuring the Firewall Management Interface The firewall management interface can be configured under each firewall context to provide a virtualized management interface (see Figure 7). The management
Configuring MPLS Hub-and-Spoke Layer 3 VPNs
CHAPTER 23 This chapter describes how to configure a hub-and-spoke topology for Multiprotocol Layer Switching (MPLS) Layer 3 virtual private networks (VPNs) on Cisco NX-OS devices. This chapter includes
Lab Configuring Syslog and NTP (Instructor Version)
(Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask
Lab 1.2.3 Review of Basic Router Configuration with RIP. Objective. Background / Preparation. General Configuration Tips
Lab 1.2.3 Review of Basic Router Configuration with RIP Objective Cable and configure workstations and routers Setup IP addressing scheme using Class B networks Configure Routing Information Protocol (RIP)
Lab 7.2.9 Load Balancing Across Multiple Paths
Lab 7.2.9 Load Balancing Across Multiple Paths Objective Configure Load balance across multiple paths. Observe the load balancing process. Background/Preparation Cable a network similar to the one in the
How To Configure Syslog over VPN
How To Configure Syslog over VPN Applicable Version: 10.00 onwards Overview Cyberoam provides extensive logging capabilities for traffic, system and network protection functions. Detailed log information
- Advanced IOS Functions -
1 The Configuration Register - Advanced IOS Functions - The configuration register (config-register) is a hexadecimal value that controls various aspects of how a router boots, including: Baud Rate Boot
PIX/ASA 7.x with Syslog Configuration Example
PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages
Monitoring System Status
CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,
Tracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
Managing ACE Software Licenses
CHAPTER 2 This chapter describes how to manage the software licenses for your Cisco 4700 Series Application Control Engine (ACE) appliance. It contains the following major sections: Information about ACE
Basic Router and Switch Instructions (Cisco Devices)
Basic Router and Switch Instructions (Cisco Devices) Basic Device Connection 1. Connect to the device via the console cable (light blue cable) and the use of a terminal program (Windows Hyperterminal,
Configuring iscsi Multipath
CHAPTER 13 Revised: April 27, 2011, OL-20458-01 This chapter describes how to configure iscsi multipath for multiple routes between a server and its storage devices. This chapter includes the following
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices. Secure Access How-to User Series
ISE TACACS+ Configuration Guide for Cisco NX-OS Based Network Devices Secure Access How-to User Series Author: Technical Marketing, Policy and Access, Security Business Group, Cisco Systems Date: January
Configuring Auto Policy-Based Routing
This chapter describes how to configure the Auto Policy-Based Routing (PBR) feature on the Citrix NetScaler Application Delivery Controller (ADC) appliance to ensure that return traffic from the real server
EMC DiskXtender File System Manager for UNIX/Linux Release 3.5
EMC DiskXtender File System Manager for UNIX/Linux Release 3.5 Administrator s Guide P/N 300-009-573 REV. A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com
Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.
Kiwi SyslogGen A Freeware Syslog message generator for Windows by SolarWinds, Inc. Kiwi SyslogGen is a free Windows Syslog message generator which sends Unix type Syslog messages to any PC or Unix Syslog
Configuring a Cisco 2509-RJ Terminal Router
created by: Rainer Bemsel Version 1.0 Dated: Dec/08/2012 For my Cisco LAB, I ve purchased a used Cisco 2509-RJ with RJ45-RJ45 roll-over cables. This TechTip shows my configuration setup, so you can easily
Lab 5.2.5 Configure IOS Firewall IDS
Lab 5.2.5 Configure IOS Firewall IDS Objective Scenario Topology: Estimated Time: 15 minutes Number of Team Members: Two teams with four students per team. In this lab, the student will learn how to perform
Encrypted Preshared Key
The feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Release Modification 12.3(2)T This feature was introduced. Finding Support Information
Enabling NetFlow on Virtual Switches ESX Server 3.5
Technical Note Enabling NetFlow on Virtual Switches ESX Server 3.5 NetFlow is a general networking tool with multiple uses, including network monitoring and profiling, billing, intrusion detection and
Encrypted Preshared Key
Encrypted Preshared Key The Encrypted Preshared Key feature allows you to securely store plain text passwords in type 6 (encrypted) format in NVRAM. Feature History for Encrypted Preshared Key Release
Troubleshooting for Yamaha router
Troubleshooting for Yamaha router How to troubleshoot This document describes how to troubleshoot for Yamaha router. - Some points which should be considered before the trouble - What you should do when
Configuring Network Load Balancing for vethernet
Configuring Network Load Balancing for vethernet This chapter contains the following sections: Information About Microsoft Network Load Balancing, page 1 Guidelines and Limitations, page 1 Configuring
PIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE. www.panduit.com [email protected] 866-721-5302 page 1
PIM SOFTWARE Configuring the Syslog Feature TECHNICAL REFERENCE TR50 Published: 5/14/08 Syslogs are typically used for computer system management and security audits and are supported by a wide variety
