Configuring LocalDirector Syslog

Size: px
Start display at page:

Download "Configuring LocalDirector Syslog"

Transcription

1 Configuring LocalDirector Syslog Document ID: LocalDirector is now End of Sale. Refer to the Cisco LocalDirector 400 Series bulletins for more information. Contents Introduction Before You Begin Conventions Prerequisites Components Used Configure How Syslog Works Configuring the LocalDirector to Send Syslog How to Set Up a Syslogd Server Debugging Syslog Verify Troubleshoot Related Information Introduction Messages produced by the LocalDirector that usually go to the console can be collected by sending these messages to a device running a syslogd daemon (syslogd). Syslogd listens on UDP port 514, the syslog port. Syslogging enables you to gain information about LocalDirector traffic and performance, analyze logs for suspicious activity, and troubleshoot problems. Syslogd can run on a number of operating system platforms. Syslogd is installed when you install UNIX, however, you must configure it. Syslogd is not usually native to Windows based systems, however, syslogd software is available for Windows NT. This document describes how syslog works, how to set up the LocalDirector to send syslog messages to a device running syslogd, and how to set up a UNIX based syslogd server. The actual meanings of LocalDirector syslog messages can be found in the LocalDirector documentation. For example, for LocalDirector syslog messages for version 4.2, refer to Syslog Messages. Before You Begin Conventions For more information on document conventions, see the Cisco Technical Tips Conventions. Prerequisites There are no specific prerequisites for this document.

2 Components Used The information in this document is based on the software and hardware versions below. All versions of Cisco LocalDirector Software. The information presented in this document was created from devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If you are working in a live network, ensure that you understand the potential impact of any command before using it. Configure In this section, you are presented with the information to configure the features described in this document. How Syslog Works All syslog messages have a logging facility and a level. The logging facility can be thought of as where, and the level can be thought of as what. Logging Facility The single syslog daemon (syslogd) can be thought of as having multiple pipes. It uses the pipes to decide where to send incoming information based on the pipe on which the information arrives. In this analogy, the logging facilities are the pipes by which the syslogd decides where to send information it receives. The eight logging facilities commonly used for syslog are local0 through local7, as shown below. Levels local0 local1 local2 local3 local4 local5 local6 local7 There are also different degrees of importance attached to incoming messages. Think of the levels as what. The LocalDirector can be set to send messages at the following different levels (these are listed from highest to lowest importance): Level emergency alert critical error warning notification informational Numeric Code

3 debug 7 When a LocalDirector is set up to send syslog messages, levels of lower importance include levels of higher importance. For example, if the LocalDirector is set for warning, error, critical, alert, and emergency messages would also be sent in addition to the warning. A debug setting would obviously include messages at all 8 levels. Configuring the LocalDirector to Send Syslog The syslog syntax is as follows: syslog host #.#.#.#! #.#.#.# is the syslog servers address. syslog output X.Y! X is the logging facility and Y is the level. How does the X number translate to logging facility? The X number translates to a logging facility when converted to binary. The last bits bits comprise the local facility, as shown below. 16 = = local0 17 = = local1 18 = = local2 19 = = local3 20 = = local4 21 = = local5 22 = = local6 23 = = local7 For example, since 22 = , and the last 4 bits=0110=decimal 6, this is local6. A short cut is to take the X value and subtract 16. For example, 22 16=6, or local6. On LocalDirector, the default facility is local4. The Y number is the level. For example, if Y=2, messages sent would include those at level 2 (critical), level 1 (alert), and level 0 (emergency). The LocalDirector levels are 0 7; these should not be confused with the logging facilities, which are local0 local7. On LocalDirector, the default level is 3 (error). Two examples are shown below. syslog 20.7! 20 equals local4 logging facility.!.7 is the level. 7 means debug to the LocalDirector, that is,! all messages will be logged.

4 syslog 23.2! 23 equals local7 logging facility!.2 is the level. 2 means critical to the LocalDirector, that is,! critical, alert, and emergency messages will be logged. You can view the current facility.level and syslog server settings on LocaLDirector by issuing the show syslog command. How to Set Up a Syslogd Server Because syslogd was originally a UNIX concept, the features available in the syslogd products on non UNIX systems depend on the vendor implementation. Features may include dividing incoming messages by facility or debug level, or both, resolving the names of the sending devices, reporting facilities, and so on. For information on configuring the non UNIX syslog server, refer to the vendor's documentation. To configure syslog on UNIX, perform the following steps: 1. As root, on SunOS, AIX, HPUX, or Solaris, backup the /etc/syslog.conf file prior to modification. 2. Modify /etc/syslog.conf to tell the UNIX system how to sort out the syslog messages coming in from the sending devices, that is, which logging_facility.level goes in which file. Make sure that there is a tab between the logging_facility.level and file_name. 3. Make sure the destination file exists and is writable. 4. The #Comment section at the beginning of syslog.conf usually explains syntax for the UNIX system. Alternatively, you can read the man page of syslogd with man syslogd. 5. Do not put file information in the ifdef section. 6. As root, restart syslogd to pick up the changes. Examples If /etc/syslog.conf is set for local7.warn /var/log/local7.warn: The warning, error, critical, alert, and emergency messages coming in on the local7 logging facility will be logged in the local7.warn file. The notification, informational, and debug messages coming in on the local7 facility will not be logged anywhere. If /etc/syslog.conf is set for local7.debug /var/log/local7.debug: The debug, informational, notification, warning, error, critical, alert, and emergency messages coming in on the local7 logging facility will be logged to the local7.debug file. If /etc/syslog.conf is set for local7.warn /var/log/local7.warn or local7.debug /var/log/local7.debug: The warning, error, critical, alert, and emergency messages coming in on the local7 logging facility will be logged to the local7.warn file. The debug, informational, notification, warning, error, critical, alert, and emergency messages coming in on the local7 logging facility will be logged to the local7.debug file (some messages will go to both files). If /etc/syslog.conf is set for *.debug /var/log/all.debug: All message levels from all logging facilities will go to this file. Debugging Syslog Before issuing any debug commands, please see Important Information on Debug Commands.

5 To start syslog in debug (SunOS, AIX, HPUX, or Solaris), you must be root: ps ef grep syslogd kill 9 <pid> syslogd d You should see the following messages at the beginning, as syslogd is reading syslog.conf: cfline(local7.info /var/log/local7.info) cfline(local7.debug /var/log/local7.debug) X X X X X X X X X X X X X X X X X X X X X X X 6 X FILE: /var/log/local7.info X X X X X X X X X X X X X X X X X X X X X X X 7 X FILE: /var/log/local7.debug If these scroll by too quickly, issue the following command: syslogd d more If you see the following messages: cfline(local7.info /var/log/local7.junk) syslogd: /var/log/local7.junk: No such file or directory logmsg: pri 53, flags 8, from pinecone, msg syslogd: /var/log/local7.junk: No such file or directory There is a problem in the setup. In the above example, the file did not exist. Running a debug will also show incoming syslog messages and to which file they are going. logmsg: pri 275, flags 0, from , MSG 14: %SYS 5 CONFIG_I: Configured from console by vty0 ( ) Logging to UNUSED Logging to FILE /var/log/local7.debug In this case, a message that should have gone to local7.junk and local7.debug was received. Because local7.junk did not exist, the following message is also received: Logging to UNUSED. If syslogd d shows that no messages are coming in, check to make sure that the show syslog command has been issued on LocalDirector. If syslogd information is arriving on the UNIX system, but not going into the proper file, work with the UNIX system administrator or operating system vendor support to correct the problem. If the cause of the problem still cannot be determined, syslog may be run in debug and the output redirected to a file as follows: or sh or ksh: syslogd d > <target_file> 2>&1 csh syslogd d >& <target_file> Note: Red Hat Linux syslogd must be started with the r option to capture network output. UNIX Extension Meaning

6 .emerg.alert.crit.err.warn.notice.info.debug Verify System unusable, emergencies. Take immediate action, alerts. Critical condition, critical. Error message, errors. Warning message, warnings. Normal but significant condition, notifications. Informational messages, informational. Debug message, debugging. There is currently no verification procedure available for this configuration. Troubleshoot There is currently no specific troubleshooting information available for this configuration. Related Information Cisco LocalDirector Technical Support Cisco Systems Contacts & Feedback Help Site Map Cisco Systems, Inc. All rights reserved. Terms & Conditions Privacy Statement Cookie Policy Trademarks of Cisco Systems, Inc. Updated: Jan 31, 2006 Document ID: 22178

Cisco Setting Up PIX Syslog

Cisco Setting Up PIX Syslog Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring

More information

Using Debug Commands

Using Debug Commands CHAPTER 1 Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using

More information

Using Debug Commands

Using Debug Commands Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using the debug?

More information

Configure Backup Server for Cisco Unified Communications Manager

Configure Backup Server for Cisco Unified Communications Manager Configure Backup Server for Cisco Unified Communications Manager Document ID: 110309 Contents Introduction Prerequisites Requirements Components Used Conventions Configure a Backup Server for Cisco Unified

More information

Using Debug Commands

Using Debug Commands C H A P T E R 1 Using Debug Commands This chapter explains how you can use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Red Condor Syslog Server Configurations

Red Condor Syslog Server Configurations Red Condor Syslog Server Configurations May 2008 2 Red Condor Syslog Server Configurations This application note describes the configuration and setup of a syslog server for use with the Red Condor mail

More information

PIX/ASA 7.x with Syslog Configuration Example

PIX/ASA 7.x with Syslog Configuration Example PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages

More information

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

Syslog Server Configuration on Wireless LAN Controllers (WLCs) Syslog Server Configuration on Wireless LAN Controllers (WLCs) Document ID: 107252 Contents Introduction Prerequisites Requirements Components Used Conventions Syslog Server Support on Wireless LAN Controllers

More information

Security Correlation Server Quick Installation Guide

Security Correlation Server Quick Installation Guide orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also

More information

Knowledge Base Articles

Knowledge Base Articles Knowledge Base Articles 2005 Jalasoft Corp. All rights reserved. TITLE: How to configure and use the Jalasoft Xian Syslog Server. REVISION: Revision : B001-SLR01 Date : 11/30/05 DESCRIPTION: Jalasoft has

More information

Database Replication Error in Cisco Unified Communication Manager

Database Replication Error in Cisco Unified Communication Manager Database Replication Error in Cisco Unified Communication Manager Document ID: 100781 Contents Introduction Prerequisites Requirements Components Used Conventions Use Unifed Reports to Debug Replication

More information

Syslog Monitoring Feature Pack

Syslog Monitoring Feature Pack AdventNet Web NMS Syslog Monitoring Feature Pack A dventnet, Inc. 5645 G ibraltar D rive Pleasanton, C A 94588 USA P ho ne: +1-925-924-9500 Fa x : +1-925-924-9600 Em ail:info@adventnet.com http://www.adventnet.com

More information

Unity Error Message: Your voicemail box is almost full

Unity Error Message: Your voicemail box is almost full Unity Error Message: Your voicemail box is almost full Document ID: 111781 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solution Delete Voice Mail Messages from

More information

Device Integration: Checkpoint Firewall-1

Device Integration: Checkpoint Firewall-1 Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat

More information

Sample Configuration Using the ip nat outside source static

Sample Configuration Using the ip nat outside source static Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Network Monitoring & Management Log Management

Network Monitoring & Management Log Management Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Configuring System Message Logging

Configuring System Message Logging This chapter describes how to configure system message logging on the Cisco Nexus 5000 Series switch and contains the following sections: Information About System Message Logging, page 1, page 2 Verifying

More information

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example

PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example Document ID: 77869 Contents Introduction Prerequisites Requirements Components Used Related Products

More information

Configuring Static and Dynamic NAT Simultaneously

Configuring Static and Dynamic NAT Simultaneously Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some

More information

Configuring Cisco CallManager IP Phones to Work With IP Phone Agent

Configuring Cisco CallManager IP Phones to Work With IP Phone Agent Configuring Cisco CallManager IP Phones to Work With IP Phone Agent Document ID: 40564 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration Procedures in Cisco CallManager

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 5 This chapter describes how to configure system message logging on Cisco NX-OS devices. This chapter includes the following sections: Information About System Message Logging, page 5-1 Licensing

More information

Moving Exchange Message Stores and Transaction Logs to an Alternate Drive

Moving Exchange Message Stores and Transaction Logs to an Alternate Drive Moving Exchange Message Stores and Transaction Logs to an Alternate Drive Document ID: 26520 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solutions Exchange 5.5

More information

Cisco Secure PIX Firewall with Two Routers Configuration Example

Cisco Secure PIX Firewall with Two Routers Configuration Example Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements

More information

ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example

ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example Document ID: 113110 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background

More information

Configuring TACACS+, RADIUS, and Kerberos on Cisco Catalyst Switches

Configuring TACACS+, RADIUS, and Kerberos on Cisco Catalyst Switches Configuring TACACS+, RADIUS, and Kerberos on Cisco alyst Switches Document ID: 13847 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configuration Steps

More information

BRI to PRI Connection Using Data Over Voice

BRI to PRI Connection Using Data Over Voice BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot

More information

Syslog & xinetd. Stephen Pilon

Syslog & xinetd. Stephen Pilon Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

RSA Authentication Manager

RSA Authentication Manager McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: RSA Authentication Manager February 26, 2015 RSA Authentication Manager Page 1 of 9 Important Note: The information contained

More information

LogLogic Trend Micro OfficeScan Log Configuration Guide

LogLogic Trend Micro OfficeScan Log Configuration Guide LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and

More information

Enable SMTP Message Notifications in Cisco Unity Connection 8.x

Enable SMTP Message Notifications in Cisco Unity Connection 8.x Enable SMTP Message Notifications in Cisco Unity Connection 8.x Document ID: 113623 Contents Introduction Prerequisites Requirements Components Used Conventions Set up SMTP Message Notifications Configurations

More information

VPN 3000 Concentrator Bandwidth Management Configuration Example

VPN 3000 Concentrator Bandwidth Management Configuration Example VPN 3000 Concentrator Bandwidth Management Configuration Example Document ID: 60329 Contents Introduction Prerequisites Requirements Components Used Network Diagram Conventions Configure a Default Bandwidth

More information

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check

More information

Presented by Henry Ng

Presented by Henry Ng Log Format Presented by Henry Ng 1 Types of Logs Content information, alerts, warnings, fatal errors Source applications, systems, drivers, libraries Format text, binary 2 Typical information in Logs Date

More information

Troubleshooting CallManager Problems with Windows NT and Internet Information Server (IIS)

Troubleshooting CallManager Problems with Windows NT and Internet Information Server (IIS) Troubleshooting CallManager s with Windows NT and Internet Information Server (IIS) Document ID: 13973 Contents Introduction Prerequisites Requirements Components Used Conventions CallManager Administration

More information

SSL Tunnels. Introduction

SSL Tunnels. Introduction SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,

More information

Introduction to Operating Systems

Introduction to Operating Systems Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these

More information

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8. TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure

More information

Configuring a Gateway of Last Resort Using IP Commands

Configuring a Gateway of Last Resort Using IP Commands Configuring a Gateway of Last Resort Using IP Commands Document ID: 16448 Contents Introduction Prerequisites Requirements Components Used Conventions ip default gateway ip default network Flag a Default

More information

Backup Cisco ICM Database in Microsoft SQL 2000

Backup Cisco ICM Database in Microsoft SQL 2000 Backup Cisco ICM Database in Microsoft SQL 2000 Document ID: 61761 Contents Introduction Prerequisites Requirements Components Used Conventions Background Backup Devices ICM Database Backup Create a New

More information

PIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE. www.panduit.com systemsupport@panduit.com 866-721-5302 page 1

PIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE. www.panduit.com systemsupport@panduit.com 866-721-5302 page 1 PIM SOFTWARE Configuring the Syslog Feature TECHNICAL REFERENCE TR50 Published: 5/14/08 Syslogs are typically used for computer system management and security audits and are supported by a wide variety

More information

IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections

IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections Document ID: 99427 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

Linux Syslog Messages in IBM Director

Linux Syslog Messages in IBM Director Ever want those pesky little Linux syslog messages (/var/log/messages) to forward to IBM Director? Well, it s not built in, but it s pretty easy to setup. You can forward syslog messages from an IBM Director

More information

Network Monitoring & Management Log Management

Network Monitoring & Management Log Management Network Monitoring & Management Log Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Syslog

More information

Table of Contents. Cisco Mapping Outbound VoIP Calls to Specific Digital Voice Ports

Table of Contents. Cisco Mapping Outbound VoIP Calls to Specific Digital Voice Ports Table of Contents Mapping Outbound VoIP Calls to Specific Digital Voice Ports...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Configure...2 Network Diagram...2

More information

Log Correlation Engine Backup Strategy

Log Correlation Engine Backup Strategy Log Correlation Engine Backup Strategy August 10, 2012 (Revision 1) Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered trademarks of

More information

Nimsoft Monitor. sysloggtw Guide. v1.4 series

Nimsoft Monitor. sysloggtw Guide. v1.4 series Nimsoft Monitor sysloggtw Guide v1.4 series Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,

More information

Locking Users into a VPN 3000 Concentrator Group Using a RADIUS Server

Locking Users into a VPN 3000 Concentrator Group Using a RADIUS Server Locking Users into a VPN 3000 Concentrator Group Using a RADIUS Server Document ID: 13831 Contents Introduction Prerequisites Requirements Components Used Conventions Configure the Cisco VPN 3000 Concentrator

More information

Sample Configuration Using the ip nat outside source list C

Sample Configuration Using the ip nat outside source list C Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

CRS 4.x: Automatic Work and Wrap up Time Configuration Example

CRS 4.x: Automatic Work and Wrap up Time Configuration Example CRS 4.x: Automatic Work and Wrap up Time Configuration Example Document ID: 91889 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Automatic Work and Wrap up Time

More information

Network Monitoring & Management Log Management

Network Monitoring & Management Log Management Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example

PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example Document ID: 82018 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background Information

More information

Understanding Simple Network Management Protocol (SNMP) Traps

Understanding Simple Network Management Protocol (SNMP) Traps Understanding Simple Network Management Protocol (SNMP) Traps Document ID: 7244 Contents Introduction Prerequisites Requirements Components Used Conventions Use SNMP Traps Examples of Traps Sent by Cisco

More information

Lab 5.5 Configuring Logging

Lab 5.5 Configuring Logging Lab 5.5 Configuring Logging Learning Objectives Configure a router to log to a Syslog server Use Kiwi Syslog Daemon as a Syslog server Configure local buffering on a router Topology Diagram Scenario In

More information

Microsoft Windows 2003 DNS Server for Wireless LAN Controller (WLC) Discovery Configuration Example

Microsoft Windows 2003 DNS Server for Wireless LAN Controller (WLC) Discovery Configuration Example Microsoft Windows 2003 DNS Server for Wireless LAN Controller (WLC) Discovery Configuration Example Document ID: 107606 Contents Introduction Prerequisites Requirements Components Used Conventions Wireless

More information

IOS NAT Load Balancing for Two ISP Connections

IOS NAT Load Balancing for Two ISP Connections IOS NAT Load Balancing for Two ISP Connections Document ID: 100658 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot

More information

EMC AVAMAR BACKUP CLIENTS

EMC AVAMAR BACKUP CLIENTS EMC AVAMAR BACKUP CLIENTS 5.0 USER GUIDE P/N 300-008-819 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.COM Copyright and Trademark Notices This document

More information

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server This document describes how to configure Apache HTTP Server

More information

Virtual Collection Points

Virtual Collection Points Virtual Collection Points 8815 Centre Park Drive Publication Date: Oct 23, 2009 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users understand Virtual

More information

Monitoring Clearswift Gateways with SCOM

Monitoring Clearswift Gateways with SCOM Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue

More information

Web Authentication Proxy on a Wireless LAN Controller Configuration Example

Web Authentication Proxy on a Wireless LAN Controller Configuration Example Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on

More information

GroundWork Monitor Open Source 5.1.0 Installation Guide

GroundWork Monitor Open Source 5.1.0 Installation Guide GroundWork Monitor Open Source 5.1 is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version

More information

Unity Express Voice Mail Transfer Behavior

Unity Express Voice Mail Transfer Behavior Unity Express Voice Mail Transfer Behavior Document ID: 97825 Contents Introduction Prerequisites Requirements Components Used Conventions Problem 1 Calls Transfer to Reception Solution 1 Transfer to AutoAttendant

More information

How To Configure Syslog over VPN

How To Configure Syslog over VPN How To Configure Syslog over VPN Applicable Version: 10.00 onwards Overview Cyberoam provides extensive logging capabilities for traffic, system and network protection functions. Detailed log information

More information

LogLogic Cisco NetFlow Log Configuration Guide

LogLogic Cisco NetFlow Log Configuration Guide LogLogic Cisco NetFlow Log Configuration Guide Document Release: September 2011 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 1.0, and LogLogic Software Release

More information

Fixing Problems with IP Phone Services

Fixing Problems with IP Phone Services Fixing s with IP Phone Services Document ID: 13959 Contents Introduction Prerequisites Requirements Components Used Conventions Change the URL Services in Cisco CallManager Reset the TFTP Server Reset

More information

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example

ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs...

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs... Connect With Confidence Astaro Log Management Getting Started Guide About this Getting Started Guide To use Astaro Log Management, logs need to be transferred from individual systems to the cloud. This

More information

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13

EventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13 Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV

More information

HP Operations Manager Software for Windows Integration Guide

HP Operations Manager Software for Windows Integration Guide HP Operations Manager Software for Windows Integration Guide This guide documents the facilities to integrate EnterpriseSCHEDULE into HP Operations Manager Software for Windows (formerly known as HP OpenView

More information

Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS

Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS Document ID: 23408 Contents Introduction Prerequisites Requirements Components

More information

Log Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2)

Log Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2) Log Correlation Engine 4.6 Quick Start Guide January 25, 2016 (Revision 2) Table of Contents Introduction... 4 Standards and Conventions... 4 Product Overview... 4 Prerequisites... 4 LCE Quick Start...

More information

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example

Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Document ID: 91672 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

SIOS Protection Suite for Linux v8.3.0. Postfix Recovery Kit Administration Guide

SIOS Protection Suite for Linux v8.3.0. Postfix Recovery Kit Administration Guide SIOS Protection Suite for Linux v8.3.0 Postfix Recovery Kit Administration Guide July 2014 This document and the information herein is the property of SIOS Technology Corp. (previously known as SteelEye

More information

Symantec Event Collector 4.3 for Cisco PIX Quick Reference

Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector for Cisco PIX Quick Reference The software described in this book is furnished under a license agreement and may be used

More information

CSE/ISE 311: Systems Administra5on Logging

CSE/ISE 311: Systems Administra5on Logging Logging Por$ons courtesy Ellen Liu Outline Introduc$on Finding log files Syslog: the system event logger Linux logrotate tool Condensing log files to useful informa$on Logging policies 13-2 Who and Why

More information

DS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x

DS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x DS License Server Installation and Configuration Guide 3DEXPERIENCE R2014x Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology Edition, Version

More information

Integrated Cisco Products

Integrated Cisco Products Installation Guide Supplement for use with Integrated Cisco Products Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA

More information

Cisco PIX Firewall Manager FAQ

Cisco PIX Firewall Manager FAQ Cisco PIX Firewall Manager FAQ Document ID: 13816 Contents Introduction What are some general tips for the best PFM performance? Where can I get documentation on the PFM? Why does PFM not install? It says

More information

Unity 7.x Event Log Errors

Unity 7.x Event Log Errors Unity 7.x Event Log Errors Document ID: 112073 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Cisco Unity Phrase Server Error Messages Unity 7.0(2) MWI Issues 1 2

More information

Active FTP vs. Passive FTP, a Definitive Explanation

Active FTP vs. Passive FTP, a Definitive Explanation Active FTP vs. Passive FTP, a Definitive Explanation Contents: Introduction The Basics Active FTP Active FTP Example Passive FTP Passive FTP Example Summary References Appendix 1: Configuration of Common

More information

NTP and Syslog in Linux. Kevin Breit

NTP and Syslog in Linux. Kevin Breit NTP and Syslog in Linux Kevin Breit Network Time Protocol (NTP) Synchronizes computer time with highly accurate time services NTP Architecture Utilizes time server hierarchy. Each level is called a stratum.

More information

Linux FTP Server Setup

Linux FTP Server Setup 17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started

More information

EMC AVAMAR 6.0 GUIDE FOR IBM DB2 P/N 300-011-636 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.

EMC AVAMAR 6.0 GUIDE FOR IBM DB2 P/N 300-011-636 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC. EMC AVAMAR 6.0 FOR IBM DB2 GUIDE P/N 300-011-636 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.COM Copyright and Trademark Notices Copyright 2002-2011

More information

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example

ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 113336 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram

More information

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc. Kiwi SyslogGen A Freeware Syslog message generator for Windows by SolarWinds, Inc. Kiwi SyslogGen is a free Windows Syslog message generator which sends Unix type Syslog messages to any PC or Unix Syslog

More information

Siebel Installation Guide for UNIX. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014

Siebel Installation Guide for UNIX. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014 Siebel Installation Guide for UNIX Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014 Copyright 2005, 2014 Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.2 Web Applications Deployed on BEA WebLogic Server 9.2

Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.2 Web Applications Deployed on BEA WebLogic Server 9.2 Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.2 Web Applications Deployed on BEA WebLogic Server 9.2 This document describes how to configure Apache HTTP Server

More information

SQL Tuning and Maintenance for the Altiris Deployment Server express database.

SQL Tuning and Maintenance for the Altiris Deployment Server express database. Article ID: 22953 SQL Tuning and Maintenance for the Altiris Deployment Server express database. Question Now Deployment Server is installed how do I manage the express database? Topics that will be covered

More information

Configuring Logging. Information About Logging CHAPTER

Configuring Logging. Information About Logging CHAPTER 52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page

More information

Checking SQL Server or MSDE Version and Service Pack Level

Checking SQL Server or MSDE Version and Service Pack Level Checking SQL Server or MSDE Version and Service Pack Level Document ID: 25784 Contents Introduction Prerequisites Requirements Components Used Conventions Use Query Analyzer with Use Query Analyzer with

More information

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example

PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example Document ID: 69374 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram

More information

PIX/ASA: Upgrade a Software Image using ASDM or CLI Configuration Example

PIX/ASA: Upgrade a Software Image using ASDM or CLI Configuration Example PIX/ASA: Upgrade a Software Image using ASDM or CLI Configuration Example Document ID: 69984 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Download Software

More information

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.

More information

CHANGES IN GECS 3.50 PACKAGES

CHANGES IN GECS 3.50 PACKAGES CHANGES IN GECS 3.50 PACKAGES GECS version 3.50 started shipping January 20 th, 2005. You can find the date of the last GECS package installed by looking in the file named PKGDATE.TXT located in your GECS

More information

Linux System Administration. System Administration Tasks

Linux System Administration. System Administration Tasks System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,

More information