Logging in Cisco IOS. The minimum you should know

Size: px
Start display at page:

Download "Logging in Cisco IOS. The minimum you should know"

Transcription

1 The minimum you should know

2 Severity-levels Router(config)#logging trap? <0-7> Logging severity level alerts Immediate action needed (severity=1) critical Critical conditions (severity=2) debugging Debugging messages (severity=7) emergencies System is unusable (severity=0) errors Error conditions (severity=3) informational Informational messages (severity=6) notifications Normal but significant conditions (severity=5) warnings Warning conditions (severity=4) <cr> Karsten Iwen - CCIE #14602 (Security, R/S) 2

3 Logging destinations host (syslog) console monitor (ssh/telnet) buffered snmp Karsten Iwen - CCIE #14602 (Security, R/S) 3

4 Logging destinations host (syslog) Router#sh run i logg logging trap warnings logging default udp/514; can also use tcp for transport: logging host transport tcp port 1234 Syslog-messages should always be send from the same source-address: Router(config)#logging source-interface loopback 0 Karsten Iwen - CCIE #14602 (Security, R/S) 4

5 Logging destinations console Router#sh logging i Console Console logging: level debugging, 19 messages logged, xml disabled Router(config)#logging console notifications Router(config)#no logging console Karsten Iwen - CCIE #14602 (Security, R/S) 5

6 Logging destinations monitor Router#sh logging i Monitor Monitor logging: level debugging, 0 messages logged, xml disabled Router(config)#logging monitor informational Router#terminal monitor Router#terminal no monitor Karsten Iwen - CCIE #14602 (Security, R/S) 6

7 Logging destinations buffered Router#sh logging i Buffer Buffer logging: disabled, xml disabled, Needs to be enabled: Router(config)#logging buffered Router#sh run i buff logging buffered 4096 debugging Router#sh logging i Buffer Buffer logging: level debugging, 1 messages logged, xml disabled, Log Buffer (4096 bytes): Karsten Iwen - CCIE #14602 (Security, R/S) 7

8 Logging destinations buffered Router#sh logging... Log Buffer (4096 bytes): *Mar 1 00:52:05.107: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up *Mar 1 00:52:06.107: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, changed state to up *Mar 1 00:52:11.115: %SYS-6-LOGGINGHOST_STARTSTOP: Logging to host started - reconnection *Mar 1 00:53:20.411: %SYS-5-CONFIG_I: Configured from console by console *Mar 1 00:54:59.431: %OSPF-5-ADJCHG: Process 1, Nbr on FastEthernet0/0 from LOADING to FULL, Loading Done Karsten Iwen - CCIE #14602 (Security, R/S) 8

9 More things to consider for correlation you need an accurate time use NTP Karsten Iwen - CCIE #14602 (Security, R/S) 9

10 More things to consider The router can count the number of messages: Router(config)#logging count Router#sh logging count Facility Message Name Sev Occur Last Time ================================================================================== SYS CONFIG_I 5 1 *Mar 1 00:08: SYS TOTAL 1 LINEPROTO UPDOWN 5 1 *Mar 1 00:08: LINEPROTO TOTAL 1 LINK UPDOWN 3 1 *Mar 1 00:08: LINK TOTAL 1 OSPF ADJCHG 5 1 *Mar 1 00:09: OSPF TOTAL 1 Karsten Iwen - CCIE #14602 (Security, R/S) 10

11 More things to consider logg-messages should include a timestamp Router(config)#service timestamps log datetime? localtime Use local time zone for timestamps msec Include milliseconds in timestamp show-timezone Add time zone information to timestamp year Include year in timestamp <cr> Karsten Iwen - CCIE #14602 (Security, R/S) 11

12 More things to consider You can group messages from similar devices: Router(config)#logging facility?... local0 Local use local1 Local use local2 Local use local3 Local use local4 Local use local5 Local use local6 Local use local7 Local use... Karsten Iwen - CCIE #14602 (Security, R/S) 12

Lab 5.5 Configuring Logging

Lab 5.5 Configuring Logging Lab 5.5 Configuring Logging Learning Objectives Configure a router to log to a Syslog server Use Kiwi Syslog Daemon as a Syslog server Configure local buffering on a router Topology Diagram Scenario In

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

System Message Logging

System Message Logging System Message Logging This module describes how to configure system message logging on your wireless device in the following sections: Understanding System Message Logging, page 1 Configuring System Message

More information

Lab Configuring Syslog and NTP (Instructor Version)

Lab Configuring Syslog and NTP (Instructor Version) (Instructor Version) Instructor Note: Red font color or Gray highlights indicate text that appears in the instructor copy only. Topology Addressing Table Objectives Device Interface IP Address Subnet Mask

More information

RSA Security Analytics

RSA Security Analytics RSA Security Analytics Event Source Log Configuration Guide Cisco IOS Last Modified: Thursday, February 19, 2015 Event Source Product Information: Vendor: Cisco Event Source: IOS Versions: IOS 12.4, 15.x

More information

Cisco IOS Embedded Syslog Manager Command Reference

Cisco IOS Embedded Syslog Manager Command Reference Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION

More information

Cisco.Selftestengine.642-813.v2013-11-30.by.Amy.32q

Cisco.Selftestengine.642-813.v2013-11-30.by.Amy.32q Cisco.Selftestengine.642-813.v2013-11-30.by.Amy.32q Number: 642-813 Passing Score: 825 Time Limit: 120 min File Version: 14.5 http://www.gratisexam.com/ Exam Code: 642-813 Exam Name: Cisco implementing

More information

Lab 11.5.6.1 Configure Syslog on AP

Lab 11.5.6.1 Configure Syslog on AP Lab 11.5.6.1 Configure Syslog on AP Estimated Time: 25 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, students will configure and use syslog logging to monitor

More information

Planning Maintenance for Complex Networks

Planning Maintenance for Complex Networks Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks Olga Torstensson TSHOOT v6 1 Maintenance Models and Methodologies A network engineer s job description

More information

Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter 1 2007 2010, Cisco Systems, Inc. All rights reserved.

Chapter 1: Planning Maintenance for Complex Networks. TSHOOT v6 Chapter 1 2007 2010, Cisco Systems, Inc. All rights reserved. : Planning Maintenance for Complex Networks CCNP TSHOOT: Maintaining and Troubleshooting IP Networks TSHOOT v6 1 Objectives Evaluate commonly-practiced models and methodologies for network maintenance

More information

APNIC Members Training Course Security workshop. 2-4 July, 2008. Port Vila Vanuatu. In conjunction with PACNOG 4

APNIC Members Training Course Security workshop. 2-4 July, 2008. Port Vila Vanuatu. In conjunction with PACNOG 4 APNIC Members Training Course Security workshop 2-4 July, 2008 Port Vila Vanuatu In conjunction with PACNOG 4 Router device security lab 1. APNIC s remote lab In these exercises you will be remotely accessing

More information

Enabling Management Protocols: NTP, SNMP, and Syslog

Enabling Management Protocols: NTP, SNMP, and Syslog SECTION 7 Enabling Management Protocols: NTP, SNMP, and Syslog In this Section This section describes how to enable basic management protocols on a Cisco AS5800 and Cisco AS5300 as part of a dial access

More information

Configuring Syslog Server on Cisco Routers with Cisco SDM

Configuring Syslog Server on Cisco Routers with Cisco SDM Configuring Syslog Server on Cisco Routers with Cisco SDM Syslog is a standard for forwarding log messages in an Internet Protocol (IP) computer network. It allows separation of the software that generates

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

Cisco Setting Up PIX Syslog

Cisco Setting Up PIX Syslog Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring

More information

Using Debug Commands

Using Debug Commands Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using the debug?

More information

Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS

Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS Document ID: 23408 Contents Introduction Prerequisites Requirements Components

More information

Using Debug Commands

Using Debug Commands C H A P T E R 1 Using Debug Commands This chapter explains how you can use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug

More information

Chapter 4 Restricting Access From Your Network

Chapter 4 Restricting Access From Your Network Chapter 4 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax NEXT Wireless Router WNR834B to protect your network. You can

More information

Chapter 3 Restricting Access From Your Network

Chapter 3 Restricting Access From Your Network Chapter 3 Restricting Access From Your Network This chapter describes how to use the content filtering and reporting features of the RangeMax Dual Band Wireless-N Router WNDR3300 to protect your network.

More information

Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top

Output Interpreter. SHOW RUNNING-CONFIG SECURITY Analysis SHOW RUNNING-CONFIG - FW Analysis. Back to top Output Interpreter You have chosen to display errors warnings general information, and helpful references. Headings are displayed for all supported commands that you submitted. SHOW RUNNING-CONFIG SECURITY

More information

Using Debug Commands

Using Debug Commands CHAPTER 1 Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using

More information

Network Monitoring & Management Log Management

Network Monitoring & Management Log Management Network Monitoring & Management Log Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Syslog

More information

One-Step Lockdown with Cisco SDM

One-Step Lockdown with Cisco SDM One-Step Lockdown with Cisco SDM Router Hardening Automagically The process of turning off unnecessary services is called hardening a router to prevent attacks or exploits. The basic steps of router hardening

More information

SNMP in Cisco IOS. The minimum you should know

SNMP in Cisco IOS. The minimum you should know The minimum you should know SNMP Framework Manager Agent MIB i.e. Cisco Works (or better something that really works) Software component on managed device Collection of objects/variables a manager can

More information

Monitoring the Firewall Services Module

Monitoring the Firewall Services Module 24 CHAPTER This chapter describes how to configure logging and SNMP for the FWSM. It also describes the contents of system log messages and the system log message format. This chapter does not provide

More information

Network Monitoring & Management Log Management

Network Monitoring & Management Log Management Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

About Cisco PIX Firewalls

About Cisco PIX Firewalls About Cisco PIX Firewalls The PIX firewall requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the firewall operating system allows various methods

More information

Configuring Logging. Information About Logging CHAPTER

Configuring Logging. Information About Logging CHAPTER 52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page

More information

MCNC Webinar Series. Syslog

MCNC Webinar Series. Syslog MCNC Webinar Series Syslog Gonz Guzman Lead Client Network Engineer gonz@mcnc.org Bradley Stevens Sr Client Network Engineer bstevens@mcnc.org Webinar Links: www.mcnc.org/cne-webinars Agenda What is syslog?

More information

Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1

Classic IOS Firewall using CBACs. 2012 Cisco and/or its affiliates. All rights reserved. 1 Classic IOS Firewall using CBACs 2012 Cisco and/or its affiliates. All rights reserved. 1 Although CBAC serves as a good foundation for understanding the revolutionary path toward modern zone based firewalls,

More information

Configuring System Message Logging

Configuring System Message Logging This chapter describes how to configure system message logging on the Cisco Nexus 5000 Series switch and contains the following sections: Information About System Message Logging, page 1, page 2 Verifying

More information

Cisco Security Information Event Management Deployment Guide

Cisco Security Information Event Management Deployment Guide Cisco Security Information Event Management Deployment Guide Revision: H1CY11 The Purpose of this Document This guide focuses on Cisco products and discusses how those products integrate with any third

More information

PIX/ASA 7.x with Syslog Configuration Example

PIX/ASA 7.x with Syslog Configuration Example PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages

More information

LAB MANUAL for Computer Network

LAB MANUAL for Computer Network LAB MANUAL for Computer Network CSE-310 F Computer Network Lab L T P - - 3 Class Work : 25 Marks Exam : 25 MARKS Total : 50 Marks This course provides students with hands on training regarding the design,

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 5 This chapter describes how to configure system message logging on Cisco NX-OS devices. This chapter includes the following sections: Information About System Message Logging, page 5-1 Licensing

More information

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series

The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including

More information

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc. Kiwi SyslogGen A Freeware Syslog message generator for Windows by SolarWinds, Inc. Kiwi SyslogGen is a free Windows Syslog message generator which sends Unix type Syslog messages to any PC or Unix Syslog

More information

PIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE. www.panduit.com systemsupport@panduit.com 866-721-5302 page 1

PIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE. www.panduit.com systemsupport@panduit.com 866-721-5302 page 1 PIM SOFTWARE Configuring the Syslog Feature TECHNICAL REFERENCE TR50 Published: 5/14/08 Syslogs are typically used for computer system management and security audits and are supported by a wide variety

More information

NAS 272 Using Your NAS as a Syslog Server

NAS 272 Using Your NAS as a Syslog Server NAS 272 Using Your NAS as a Syslog Server Enable your NAS as a Syslog Server to centrally manage the logs from all network devices A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this

More information

CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute.

CCNA Security. Chapter Two Securing Network Devices. 2009 Cisco Learning Institute. CCNA Security Chapter Two Securing Network Devices 1 The Edge Router What is the edge router? - The last router between the internal network and an untrusted network such as the Internet - Functions as

More information

Table of Contents. Cisco DSL Router Configuration and Troubleshooting Guide

Table of Contents. Cisco DSL Router Configuration and Troubleshooting Guide Table of Contents...1 Types of Service...1 Step by Step Configuration of a PC Acting as a PPPoE Client...2 Step by Step Configuration...2 Connect the Cisco DSL Router and Your PC...2 Start and Set Up HyperTerminal...2

More information

Network Security Knowledge is Everything! Network Operations

Network Security Knowledge is Everything! Network Operations Network Security Knowledge is Everything Network Operations Warrick Mitchell - Network Engineer warrick.mitchell@aarnet.edu.au Agenda What is Network Security General Configuration Security Logging and

More information

Web-Based Configuration Manual System Report. Table of Contents

Web-Based Configuration Manual System Report. Table of Contents Table of Contents Table of Contents... 1-1 1.1 Information Center Overview... 1-1 1.2 Configuring the Log Host... 1-1 1.2.1 Log Host Configuration Tasks... 1-1 1.2.2 Log Host Configuration Details... 1-2

More information

login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30

login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30 logging enable logging console 4 logging timestamp logging trap 5 logging buffered 4 logging device id hostname logging host 10.0.128.240 udp/514 format emblem logging host 10.0.143.24 udp/514 login timeout

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

Configuring Logging with CLI

Configuring Logging with CLI Event and Accounting Logs Configuring Logging with CLI This section provides information to configure logging using the command line interface. Topics in this section include: Log Configuration Overview

More information

System Log Setup (RTA1025W Rev2)

System Log Setup (RTA1025W Rev2) System Log Setup (RTA1025W Rev2) System Log As shown on the web page, you can view the system log and configure system log whenever you want. To view the system log, you must configure system log first.

More information

Barracuda Networks Web Application Firewall

Barracuda Networks Web Application Firewall McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Barracuda Networks Web Application Firewall January 30, 2015 Barracuda Networks Web Application Firewall Page 1 of 10 Important

More information

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others

Table of Contents. Cisco Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others Cisco IOS Firewall to Allow Java Applets From Known Sites w Table of Contents Using the Cisco IOS Firewall to Allow Java Applets From Known Sites while Denying Others...1 Introduction...1 To Deny Java

More information

Embedded Syslog Manager Configuration Guide, Cisco IOS Release 12.2SR

Embedded Syslog Manager Configuration Guide, Cisco IOS Release 12.2SR Embedded Syslog Manager Configuration Guide, Cisco IOS Release 12.2SR Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000

More information

HP OpenView Network Node Manager

HP OpenView Network Node Manager HP OpenView Network Node Manager Syslog Integration White Paper Version: 7.01 HP-UX, Solaris Manufacturing Part Number: None July 2004 Copyright 2004 Hewlett-Packard Development Company, L.P. Legal Notices

More information

Cloud Services MDM. Reports & Alerts Admin Guide

Cloud Services MDM. Reports & Alerts Admin Guide Cloud Services MDM Reports & Alerts Admin Guide 10/27/2014 Reports and Alerts is one of nine sections of the overall Admin Guide for Mobile Device Manager. The following is the complete list of MDM Admin

More information

Security Audit CHAPTER21. Perform Security Audit

Security Audit CHAPTER21. Perform Security Audit CHAPTER21 Perform is a feature that examines your existing router configurations and then updates your router in order to make your router and network more secure. is based on the Cisco IOS AutoSecure

More information

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup

Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Introduction Installation firewall analyzer step by step installation Startup Syslog and SNMP setup on firewall side firewall analyzer startup Configuration Syslog server add and check Configure SNMP on

More information

Chapter 8 Monitoring and Logging

Chapter 8 Monitoring and Logging Chapter 8 Monitoring and Logging This chapter describes the SSL VPN Concentrator status information, logging, alerting and reporting features. It describes: SSL VPN Concentrator Status Active Users Event

More information

Chapter 1 Introduction to Network Maintenance Objectives

Chapter 1 Introduction to Network Maintenance Objectives Introduction to Network Maintenance Objectives Describe network maintenance tasks Explain the difference between proactive and reactive network maintenance. Describe well-known network maintenance models.

More information

Table of Contents. Configuring IP Access Lists

Table of Contents. Configuring IP Access Lists Table of Contents...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...2 Understanding ACL Concepts...2 Using Masks...2 Summarizing ACLs...3 Processing ACLs...4 Defining Ports and Message

More information

Step by Step: vcenter Syslog Collector installation

Step by Step: vcenter Syslog Collector installation Step by Step: vcenter Syslog Collector installation I have put together these screenshots detailing the step by step installation of vcenter Syslog Collector for VMware vsphere 5.x. I am assuming the following:

More information

Network Monitoring & Management Log Management

Network Monitoring & Management Log Management Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Alarms. Understanding Alarms CHAPTER

Alarms. Understanding Alarms CHAPTER CHAPTER 7 This chapter provides information on Serviceability and contains the following topics: Understanding, page 7-1 Alarm Configuration, page 7-2 Alarm Monitors, page 7-3 Alarm Filters, page 7-4 Viewing

More information

Manage Firewalls and Log Collection

Manage Firewalls and Log Collection Manage Firewalls and Log Collection Palo Alto Networks Panorama Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara,

More information

Center for Internet Security Gold Standard Benchmark for Cisco IOS

Center for Internet Security Gold Standard Benchmark for Cisco IOS Center for Internet Security Gold Standard Benchmark for Cisco IOS Level 1 and 2 Benchmarks Version 2.1 http://www.cisecurity.org rat-feedback@cisecurity.org September 2, 2003 Abstract This document defines

More information

F5 Local Traffic Manager

F5 Local Traffic Manager McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: F5 Local Traffic Manager July 22, 2014 F5 Local Traffic Manager Page 1 of 6 Important Note: The information contained in

More information

Symantec Event Collector 4.3 for Cisco PIX Quick Reference

Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector for Cisco PIX Quick Reference The software described in this book is furnished under a license agreement and may be used

More information

Configuring a Leased Line

Configuring a Leased Line CHAPTER 4 Configuring a Leased Line The configuration in this chapter describes how to configure a Cisco 1700 router for IP and IPX over a synchronous serial line. Before You Begin The configuration in

More information

RSA Authentication Manager

RSA Authentication Manager McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: RSA Authentication Manager February 26, 2015 RSA Authentication Manager Page 1 of 9 Important Note: The information contained

More information

8 steps to protect your Cisco router

8 steps to protect your Cisco router 8 steps to protect your Cisco router Daniel B. Cid daniel@underlinux.com.br Network security is a completely changing area; new devices like IDS (Intrusion Detection systems), IPS (Intrusion Prevention

More information

Simple MPLS network topology for Dynamips/Olive

Simple MPLS network topology for Dynamips/Olive Simple MPLS network topology for Dynamips/Olive R1 version 12.4 service timestamps debug datetime msec service timestamps log datetime msec no service password-encryption hostname R1 boot-start-marker

More information

OLD DOMINION UNIVERSITY 4.3.4.2 - Router-Switch Best Practices. (last updated : 20080305 )

OLD DOMINION UNIVERSITY 4.3.4.2 - Router-Switch Best Practices. (last updated : 20080305 ) OLD DOMINION UNIVERSITY 4.3.4.2 - Router-Switch Best Practices (last updated: 20080303) Introduction One of the information techlogy priorities for Old Dominion University (ODU) is to provide and maintain

More information

Building Scalable Syslog Management Solutions

Building Scalable Syslog Management Solutions White Paper Building Scalable Syslog Management Solutions White Paper Last Updated: April, 2011 Clayton Dukes Network Management Consulting Engineer Advanced Services - Central Engineering cdukes@cisco.com

More information

Lab 3.8.3 Configure Cisco IOS Firewall CBAC on a Cisco Router

Lab 3.8.3 Configure Cisco IOS Firewall CBAC on a Cisco Router Lab 3.8.3 Configure Cisco IOS Firewall CBAC on a Cisco Router Objective Scenario Topology Estimated Time: 35 minutes Number of Team Members: Two teams with four students per team In this lab exercise,

More information

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide

Pandora FMS 3.0 Quick User's Guide: Network Monitoring. Pandora FMS 3.0 Quick User's Guide Pandora FMS 3.0 Quick User's Guide April 27th, 2009 1 Contents How to monitor a network computer/device?...3 Concepts...3 What's an agent?...3 What's a module?...3 Data transfer modes...3 What is an alert?...3

More information

How To Configure Syslog over VPN

How To Configure Syslog over VPN How To Configure Syslog over VPN Applicable Version: 10.00 onwards Overview Cyberoam provides extensive logging capabilities for traffic, system and network protection functions. Detailed log information

More information

Red Condor Syslog Server Configurations

Red Condor Syslog Server Configurations Red Condor Syslog Server Configurations May 2008 2 Red Condor Syslog Server Configurations This application note describes the configuration and setup of a syslog server for use with the Red Condor mail

More information

HP OpenView Network Node Manager

HP OpenView Network Node Manager HP OpenView Network Node Manager Syslog Integration White Paper Version: 7.0 HP-UX, Solaris Manufacturing Part Number: None March 2004 Copyright 2004 Hewlett-Packard Development Company, L.P. Legal Notices

More information

A10 Networks Load Balancer

A10 Networks Load Balancer McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: A10 Networks Load Balancer January 26, 2015 A10 Networks Load Balancer Page 1 of 8 Important Note: The information contained

More information

CCNA Exploration 4.0: ESwitching Basic Switching / Wireless PT Practice SBA. Switch S1 S1#sh ru Building configuration...

CCNA Exploration 4.0: ESwitching Basic Switching / Wireless PT Practice SBA. Switch S1 S1#sh ru Building configuration... CCNA Exploration 4.0: ESwitching Basic Switching / Wireless PT Practice SBA Switch S1 S1#sh ru Building configuration... Current configuration : 1639 bytes version 12.2 no service timestamps log datetime

More information

Monitoring System Status

Monitoring System Status CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,

More information

Accellion Secure File Transfer

Accellion Secure File Transfer McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Accellion Secure File Transfer January 26, 2015 Accellion Secure File Transfer Page 1 of 7 Important Note: The information

More information

Configurazione Rete VoIP

Configurazione Rete VoIP Configurazione Rete VoIP 1x CISCO 7940G 1x CISCO 3725 with cme-full-7.0.0.1.tar 1x CISCO IP Communicator Startup Config router CISCO 3725 Procedura Operativa: Topologia di rete Operazioni preliminary sul

More information

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013 Everything You Always Wanted to Know About Log Management But Were Afraid to Ask August 21, 2013 Logging and Log Management Logging and Log Management The authoritative Guide to Understanding the Concepts

More information

Chapter 3 Using Maintenance & Troubleshooting Tools & Applications Objectives

Chapter 3 Using Maintenance & Troubleshooting Tools & Applications Objectives Using Maintenance & Troubleshooting Tools & Applications Objectives Describe & utilise Cisco IOS diagnostic tools. Explain the need for specialist tools in the troubleshooting process. Configure software

More information

The Bomgar Appliance in the Network

The Bomgar Appliance in the Network The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.

More information

Configure Cisco IOS Firewall to use stateful packet inspection for IPv6. Configure Cisco IOS Firewall to use packet filtering for IPv6.

Configure Cisco IOS Firewall to use stateful packet inspection for IPv6. Configure Cisco IOS Firewall to use packet filtering for IPv6. Lab 7-3 Configuring Cisco IOS Firewall In this activity, you will configure various types of ACLs, to achieve the desired filtering objectives. After completing this activity, you will be able to meet

More information

Domain Name System Server Round-Robin Functionality for the Cisco AS5800

Domain Name System Server Round-Robin Functionality for the Cisco AS5800 Domain Name System Server Round-Robin Functionality for the Cisco AS5800 This feature module describes Domain Name System (DNS) server round-robin functionality for the Cisco AS5800 universal access server.

More information

Embedded Syslog Manager Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches)

Embedded Syslog Manager Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Embedded Syslog Manager Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3850 Switches) Embedded Syslog Manager (ESM) 2 Finding Feature Information 2 Restrictions for Embedded Syslog Manager 2 Information

More information

SolarWinds Certified Professional. Exam Preparation Guide

SolarWinds Certified Professional. Exam Preparation Guide SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how

More information

Configurazione Rete VoIP

Configurazione Rete VoIP Configurazione Rete VoIP 1x CISCO 7940G 1x CISCO 3725 with cme-full-7.0.0.1.tar 1x CISCO IP Communicator Startup Config router CISCO 3725 Procedura Operativa: Topologia di rete Operazioni preliminary sul

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Felix Rohrer. PT Activity 7.5.3: Troubleshooting Wireless WRT300N. Topology Diagram

Felix Rohrer. PT Activity 7.5.3: Troubleshooting Wireless WRT300N. Topology Diagram Felix Rohrer PT Activity 7.5.3: Troubleshooting Wireless WRT300N Topology Diagram All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information.

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

Syslog Server Configuration on Wireless LAN Controllers (WLCs) Syslog Server Configuration on Wireless LAN Controllers (WLCs) Document ID: 107252 Contents Introduction Prerequisites Requirements Components Used Conventions Syslog Server Support on Wireless LAN Controllers

More information

SolarWinds Log & Event Manager

SolarWinds Log & Event Manager Corona Technical Services SolarWinds Log & Event Manager Training Project/Implementation Outline James Kluza 14 Table of Contents Overview... 3 Example Project Schedule... 3 Pre-engagement Checklist...

More information

Document ID: 45741. Introduction

Document ID: 45741. Introduction Products & Services 6bone Connection Using 6to4 Tunnels for IPv6 Document ID: 45741 Contents Introduction Prerequisites Requirements Components Used Conventions How 6to4 Tunnels Work Limitations of 6to4

More information

emerge 50P emerge 5000P

emerge 50P emerge 5000P emerge 50P emerge 5000P Initial Software Setup Guide May 2013 Linear LLC 1950 Camino Vida Roble Suite 150 Carlsbad, CA 92008 www.linearcorp.com Copyright Linear LLC. All rights reserved. This guide is

More information

Cisco Secure PIX Firewall with Two Routers Configuration Example

Cisco Secure PIX Firewall with Two Routers Configuration Example Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements

More information

Network Diagram Scalability Testbed and Configuration Files

Network Diagram Scalability Testbed and Configuration Files APPENDIX A Network Diagram Scalability Testbed and Configuration Files This appendix contains configurations that were used during a V 3 PN performance and scalability evaluation based on the network illustrated

More information

Most Common DMVPN Troubleshooting Solutions

Most Common DMVPN Troubleshooting Solutions Most Common DMVPN Troubleshooting s Document ID: 111976 Contents Introduction Prerequisites Requirements Components Used Conventions DMVPN Configuration does not work s Common Issues Verify if ISAKMP packets

More information

Lab 5-5 Configuring the Cisco IOS DHCP Server

Lab 5-5 Configuring the Cisco IOS DHCP Server Lab 5-5 Configuring the Cisco IOS DHCP Server Learning Objectives Configure and verify the operation of the Cisco IOS DHCP server Configure an IP Helper address Review the EIGRP configuration Topology

More information