Configuring LocalDirector Syslog
|
|
- Sylvia McKenzie
- 7 years ago
- Views:
Transcription
1 Configuring LocalDirector Syslog Document ID: LocalDirector is now End of Sale. Refer to the Cisco LocalDirector 400 Series bulletins for more information. Contents Introduction Before You Begin Conventions Prerequisites Components Used Configure How Syslog Works Configuring the LocalDirector to Send Syslog How to Set Up a Syslogd Server Debugging Syslog Verify Troubleshoot Related Information Introduction Messages produced by the LocalDirector that usually go to the console can be collected by sending these messages to a device running a syslogd daemon (syslogd). Syslogd listens on UDP port 514, the syslog port. Syslogging enables you to gain information about LocalDirector traffic and performance, analyze logs for suspicious activity, and troubleshoot problems. Syslogd can run on a number of operating system platforms. Syslogd is installed when you install UNIX, however, you must configure it. Syslogd is not usually native to Windows based systems, however, syslogd software is available for Windows NT. This document describes how syslog works, how to set up the LocalDirector to send syslog messages to a device running syslogd, and how to set up a UNIX based syslogd server. The actual meanings of LocalDirector syslog messages can be found in the LocalDirector documentation. For example, for LocalDirector syslog messages for version 4.2, refer to Syslog Messages. Before You Begin Conventions For more information on document conventions, see the Cisco Technical Tips Conventions. Prerequisites There are no specific prerequisites for this document.
2 Components Used The information in this document is based on the software and hardware versions below. All versions of Cisco LocalDirector Software. The information presented in this document was created from devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If you are working in a live network, ensure that you understand the potential impact of any command before using it. Configure In this section, you are presented with the information to configure the features described in this document. How Syslog Works All syslog messages have a logging facility and a level. The logging facility can be thought of as where, and the level can be thought of as what. Logging Facility The single syslog daemon (syslogd) can be thought of as having multiple pipes. It uses the pipes to decide where to send incoming information based on the pipe on which the information arrives. In this analogy, the logging facilities are the pipes by which the syslogd decides where to send information it receives. The eight logging facilities commonly used for syslog are local0 through local7, as shown below. Levels local0 local1 local2 local3 local4 local5 local6 local7 There are also different degrees of importance attached to incoming messages. Think of the levels as what. The LocalDirector can be set to send messages at the following different levels (these are listed from highest to lowest importance): Level emergency alert critical error warning notification informational Numeric Code
3 debug 7 When a LocalDirector is set up to send syslog messages, levels of lower importance include levels of higher importance. For example, if the LocalDirector is set for warning, error, critical, alert, and emergency messages would also be sent in addition to the warning. A debug setting would obviously include messages at all 8 levels. Configuring the LocalDirector to Send Syslog The syslog syntax is as follows: syslog host #.#.#.#! #.#.#.# is the syslog servers address. syslog output X.Y! X is the logging facility and Y is the level. How does the X number translate to logging facility? The X number translates to a logging facility when converted to binary. The last bits bits comprise the local facility, as shown below. 16 = = local0 17 = = local1 18 = = local2 19 = = local3 20 = = local4 21 = = local5 22 = = local6 23 = = local7 For example, since 22 = , and the last 4 bits=0110=decimal 6, this is local6. A short cut is to take the X value and subtract 16. For example, 22 16=6, or local6. On LocalDirector, the default facility is local4. The Y number is the level. For example, if Y=2, messages sent would include those at level 2 (critical), level 1 (alert), and level 0 (emergency). The LocalDirector levels are 0 7; these should not be confused with the logging facilities, which are local0 local7. On LocalDirector, the default level is 3 (error). Two examples are shown below. syslog 20.7! 20 equals local4 logging facility.!.7 is the level. 7 means debug to the LocalDirector, that is,! all messages will be logged.
4 syslog 23.2! 23 equals local7 logging facility!.2 is the level. 2 means critical to the LocalDirector, that is,! critical, alert, and emergency messages will be logged. You can view the current facility.level and syslog server settings on LocaLDirector by issuing the show syslog command. How to Set Up a Syslogd Server Because syslogd was originally a UNIX concept, the features available in the syslogd products on non UNIX systems depend on the vendor implementation. Features may include dividing incoming messages by facility or debug level, or both, resolving the names of the sending devices, reporting facilities, and so on. For information on configuring the non UNIX syslog server, refer to the vendor's documentation. To configure syslog on UNIX, perform the following steps: 1. As root, on SunOS, AIX, HPUX, or Solaris, backup the /etc/syslog.conf file prior to modification. 2. Modify /etc/syslog.conf to tell the UNIX system how to sort out the syslog messages coming in from the sending devices, that is, which logging_facility.level goes in which file. Make sure that there is a tab between the logging_facility.level and file_name. 3. Make sure the destination file exists and is writable. 4. The #Comment section at the beginning of syslog.conf usually explains syntax for the UNIX system. Alternatively, you can read the man page of syslogd with man syslogd. 5. Do not put file information in the ifdef section. 6. As root, restart syslogd to pick up the changes. Examples If /etc/syslog.conf is set for local7.warn /var/log/local7.warn: The warning, error, critical, alert, and emergency messages coming in on the local7 logging facility will be logged in the local7.warn file. The notification, informational, and debug messages coming in on the local7 facility will not be logged anywhere. If /etc/syslog.conf is set for local7.debug /var/log/local7.debug: The debug, informational, notification, warning, error, critical, alert, and emergency messages coming in on the local7 logging facility will be logged to the local7.debug file. If /etc/syslog.conf is set for local7.warn /var/log/local7.warn or local7.debug /var/log/local7.debug: The warning, error, critical, alert, and emergency messages coming in on the local7 logging facility will be logged to the local7.warn file. The debug, informational, notification, warning, error, critical, alert, and emergency messages coming in on the local7 logging facility will be logged to the local7.debug file (some messages will go to both files). If /etc/syslog.conf is set for *.debug /var/log/all.debug: All message levels from all logging facilities will go to this file. Debugging Syslog Before issuing any debug commands, please see Important Information on Debug Commands.
5 To start syslog in debug (SunOS, AIX, HPUX, or Solaris), you must be root: ps ef grep syslogd kill 9 <pid> syslogd d You should see the following messages at the beginning, as syslogd is reading syslog.conf: cfline(local7.info /var/log/local7.info) cfline(local7.debug /var/log/local7.debug) X X X X X X X X X X X X X X X X X X X X X X X 6 X FILE: /var/log/local7.info X X X X X X X X X X X X X X X X X X X X X X X 7 X FILE: /var/log/local7.debug If these scroll by too quickly, issue the following command: syslogd d more If you see the following messages: cfline(local7.info /var/log/local7.junk) syslogd: /var/log/local7.junk: No such file or directory logmsg: pri 53, flags 8, from pinecone, msg syslogd: /var/log/local7.junk: No such file or directory There is a problem in the setup. In the above example, the file did not exist. Running a debug will also show incoming syslog messages and to which file they are going. logmsg: pri 275, flags 0, from , MSG 14: %SYS 5 CONFIG_I: Configured from console by vty0 ( ) Logging to UNUSED Logging to FILE /var/log/local7.debug In this case, a message that should have gone to local7.junk and local7.debug was received. Because local7.junk did not exist, the following message is also received: Logging to UNUSED. If syslogd d shows that no messages are coming in, check to make sure that the show syslog command has been issued on LocalDirector. If syslogd information is arriving on the UNIX system, but not going into the proper file, work with the UNIX system administrator or operating system vendor support to correct the problem. If the cause of the problem still cannot be determined, syslog may be run in debug and the output redirected to a file as follows: or sh or ksh: syslogd d > <target_file> 2>&1 csh syslogd d >& <target_file> Note: Red Hat Linux syslogd must be started with the r option to capture network output. UNIX Extension Meaning
6 .emerg.alert.crit.err.warn.notice.info.debug Verify System unusable, emergencies. Take immediate action, alerts. Critical condition, critical. Error message, errors. Warning message, warnings. Normal but significant condition, notifications. Informational messages, informational. Debug message, debugging. There is currently no verification procedure available for this configuration. Troubleshoot There is currently no specific troubleshooting information available for this configuration. Related Information Cisco LocalDirector Technical Support Cisco Systems Contacts & Feedback Help Site Map Cisco Systems, Inc. All rights reserved. Terms & Conditions Privacy Statement Cookie Policy Trademarks of Cisco Systems, Inc. Updated: Jan 31, 2006 Document ID: 22178
Cisco Setting Up PIX Syslog
Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring
More informationUsing Debug Commands
CHAPTER 1 Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using
More informationUsing Debug Commands
Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using the debug?
More informationConfigure Backup Server for Cisco Unified Communications Manager
Configure Backup Server for Cisco Unified Communications Manager Document ID: 110309 Contents Introduction Prerequisites Requirements Components Used Conventions Configure a Backup Server for Cisco Unified
More informationUsing Debug Commands
C H A P T E R 1 Using Debug Commands This chapter explains how you can use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug
More informationSecurity Correlation Server Quick Installation Guide
orrelogtm Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
More informationRed Condor Syslog Server Configurations
Red Condor Syslog Server Configurations May 2008 2 Red Condor Syslog Server Configurations This application note describes the configuration and setup of a syslog server for use with the Red Condor mail
More informationPIX/ASA 7.x with Syslog Configuration Example
PIX/ASA 7.x with Syslog Configuration Example Document ID: 63884 Introduction Prerequisites Requirements Components Used Conventions Basic Syslog Configure Basic Syslog using ASDM Send Syslog Messages
More informationSyslog Server Configuration on Wireless LAN Controllers (WLCs)
Syslog Server Configuration on Wireless LAN Controllers (WLCs) Document ID: 107252 Contents Introduction Prerequisites Requirements Components Used Conventions Syslog Server Support on Wireless LAN Controllers
More informationSecurity Correlation Server Quick Installation Guide
orrelog Security Correlation Server Quick Installation Guide This guide provides brief information on how to install the CorreLog Server system on a Microsoft Windows platform. This information can also
More informationKnowledge Base Articles
Knowledge Base Articles 2005 Jalasoft Corp. All rights reserved. TITLE: How to configure and use the Jalasoft Xian Syslog Server. REVISION: Revision : B001-SLR01 Date : 11/30/05 DESCRIPTION: Jalasoft has
More informationDatabase Replication Error in Cisco Unified Communication Manager
Database Replication Error in Cisco Unified Communication Manager Document ID: 100781 Contents Introduction Prerequisites Requirements Components Used Conventions Use Unifed Reports to Debug Replication
More informationSyslog Monitoring Feature Pack
AdventNet Web NMS Syslog Monitoring Feature Pack A dventnet, Inc. 5645 G ibraltar D rive Pleasanton, C A 94588 USA P ho ne: +1-925-924-9500 Fa x : +1-925-924-9600 Em ail:info@adventnet.com http://www.adventnet.com
More informationUnity Error Message: Your voicemail box is almost full
Unity Error Message: Your voicemail box is almost full Document ID: 111781 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solution Delete Voice Mail Messages from
More informationDevice Integration: Checkpoint Firewall-1
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
More informationSample Configuration Using the ip nat outside source static
Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1
More informationNetwork Monitoring & Management Log Management
Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationConfiguring System Message Logging
This chapter describes how to configure system message logging on the Cisco Nexus 5000 Series switch and contains the following sections: Information About System Message Logging, page 1, page 2 Verifying
More informationPIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example
PIX/ASA: Allow Remote Desktop Protocol Connection through the Security Appliance Configuration Example Document ID: 77869 Contents Introduction Prerequisites Requirements Components Used Related Products
More informationConfiguring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
More informationConfiguring Cisco CallManager IP Phones to Work With IP Phone Agent
Configuring Cisco CallManager IP Phones to Work With IP Phone Agent Document ID: 40564 Contents Introduction Prerequisites Requirements Components Used Conventions Configuration Procedures in Cisco CallManager
More informationConfiguring System Message Logging
CHAPTER 5 This chapter describes how to configure system message logging on Cisco NX-OS devices. This chapter includes the following sections: Information About System Message Logging, page 5-1 Licensing
More informationMoving Exchange Message Stores and Transaction Logs to an Alternate Drive
Moving Exchange Message Stores and Transaction Logs to an Alternate Drive Document ID: 26520 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Solutions Exchange 5.5
More informationCisco Secure PIX Firewall with Two Routers Configuration Example
Cisco Secure PIX Firewall with Two Routers Configuration Example Document ID: 15244 Interactive: This document offers customized analysis of your Cisco device. Contents Introduction Prerequisites Requirements
More informationASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example
ASA 8.3 and Later: Enable FTP/TFTP Services Configuration Example Document ID: 113110 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background
More informationConfiguring TACACS+, RADIUS, and Kerberos on Cisco Catalyst Switches
Configuring TACACS+, RADIUS, and Kerberos on Cisco alyst Switches Document ID: 13847 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Configuration Steps
More informationBRI to PRI Connection Using Data Over Voice
BRI to PRI Connection Using Data Over Voice Document ID: 14962 Contents Introduction Prerequisites Requirements Conventions Background Information Configure Network Diagram Configurations Verify Troubleshoot
More informationSyslog & xinetd. Stephen Pilon
Syslog & xinetd Stephen Pilon What create log files? Logging Policies Throw away all data immediately Reset log files at periodic intervals Rotate log files, keeping data for a fixed time Compress and
More informationConfiguring System Message Logging
CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records
More informationRSA Authentication Manager
McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: RSA Authentication Manager February 26, 2015 RSA Authentication Manager Page 1 of 9 Important Note: The information contained
More informationLogLogic Trend Micro OfficeScan Log Configuration Guide
LogLogic Trend Micro OfficeScan Log Configuration Guide Document Release: September 2011 Part Number: LL600065-00ELS090000 This manual supports LogLogic Trend Micro OfficeScan Release 1.0 and later, and
More informationEnable SMTP Message Notifications in Cisco Unity Connection 8.x
Enable SMTP Message Notifications in Cisco Unity Connection 8.x Document ID: 113623 Contents Introduction Prerequisites Requirements Components Used Conventions Set up SMTP Message Notifications Configurations
More informationVPN 3000 Concentrator Bandwidth Management Configuration Example
VPN 3000 Concentrator Bandwidth Management Configuration Example Document ID: 60329 Contents Introduction Prerequisites Requirements Components Used Network Diagram Conventions Configure a Default Bandwidth
More informationFundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
More informationPresented by Henry Ng
Log Format Presented by Henry Ng 1 Types of Logs Content information, alerts, warnings, fatal errors Source applications, systems, drivers, libraries Format text, binary 2 Typical information in Logs Date
More informationTroubleshooting CallManager Problems with Windows NT and Internet Information Server (IIS)
Troubleshooting CallManager s with Windows NT and Internet Information Server (IIS) Document ID: 13973 Contents Introduction Prerequisites Requirements Components Used Conventions CallManager Administration
More informationSSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
More informationIntroduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
More informationTECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.
TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure
More informationConfiguring a Gateway of Last Resort Using IP Commands
Configuring a Gateway of Last Resort Using IP Commands Document ID: 16448 Contents Introduction Prerequisites Requirements Components Used Conventions ip default gateway ip default network Flag a Default
More informationBackup Cisco ICM Database in Microsoft SQL 2000
Backup Cisco ICM Database in Microsoft SQL 2000 Document ID: 61761 Contents Introduction Prerequisites Requirements Components Used Conventions Background Backup Devices ICM Database Backup Create a New
More informationPIM SOFTWARE TR50. Configuring the Syslog Feature TECHNICAL REFERENCE. www.panduit.com systemsupport@panduit.com 866-721-5302 page 1
PIM SOFTWARE Configuring the Syslog Feature TECHNICAL REFERENCE TR50 Published: 5/14/08 Syslogs are typically used for computer system management and security audits and are supported by a wide variety
More informationIOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections
IOS NAT Load Balancing with Optimized Edge Routing for Two Internet Connections Document ID: 99427 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
More informationConfiguring System Message Logging
CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco
More informationLinux Syslog Messages in IBM Director
Ever want those pesky little Linux syslog messages (/var/log/messages) to forward to IBM Director? Well, it s not built in, but it s pretty easy to setup. You can forward syslog messages from an IBM Director
More informationNetwork Monitoring & Management Log Management
Network Monitoring & Management Log Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Syslog
More informationTable of Contents. Cisco Mapping Outbound VoIP Calls to Specific Digital Voice Ports
Table of Contents Mapping Outbound VoIP Calls to Specific Digital Voice Ports...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 Configure...2 Network Diagram...2
More informationLog Correlation Engine Backup Strategy
Log Correlation Engine Backup Strategy August 10, 2012 (Revision 1) Copyright 2002-2012 Tenable Network Security, Inc. Tenable Network Security, Nessus and ProfessionalFeed are registered trademarks of
More informationNimsoft Monitor. sysloggtw Guide. v1.4 series
Nimsoft Monitor sysloggtw Guide v1.4 series Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,
More informationLocking Users into a VPN 3000 Concentrator Group Using a RADIUS Server
Locking Users into a VPN 3000 Concentrator Group Using a RADIUS Server Document ID: 13831 Contents Introduction Prerequisites Requirements Components Used Conventions Configure the Cisco VPN 3000 Concentrator
More informationSample Configuration Using the ip nat outside source list C
Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1
More informationCRS 4.x: Automatic Work and Wrap up Time Configuration Example
CRS 4.x: Automatic Work and Wrap up Time Configuration Example Document ID: 91889 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Automatic Work and Wrap up Time
More informationNetwork Monitoring & Management Log Management
Network Monitoring & Management Log Management Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
More informationPIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example
PIX/ASA 7.x: Enable FTP/TFTP Services Configuration Example Document ID: 82018 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Background Information
More informationUnderstanding Simple Network Management Protocol (SNMP) Traps
Understanding Simple Network Management Protocol (SNMP) Traps Document ID: 7244 Contents Introduction Prerequisites Requirements Components Used Conventions Use SNMP Traps Examples of Traps Sent by Cisco
More informationLab 5.5 Configuring Logging
Lab 5.5 Configuring Logging Learning Objectives Configure a router to log to a Syslog server Use Kiwi Syslog Daemon as a Syslog server Configure local buffering on a router Topology Diagram Scenario In
More informationMicrosoft Windows 2003 DNS Server for Wireless LAN Controller (WLC) Discovery Configuration Example
Microsoft Windows 2003 DNS Server for Wireless LAN Controller (WLC) Discovery Configuration Example Document ID: 107606 Contents Introduction Prerequisites Requirements Components Used Conventions Wireless
More informationIOS NAT Load Balancing for Two ISP Connections
IOS NAT Load Balancing for Two ISP Connections Document ID: 100658 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram Configurations Verify Troubleshoot
More informationEMC AVAMAR BACKUP CLIENTS
EMC AVAMAR BACKUP CLIENTS 5.0 USER GUIDE P/N 300-008-819 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.COM Copyright and Trademark Notices This document
More informationConfiguring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server
Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server This document describes how to configure Apache HTTP Server
More informationVirtual Collection Points
Virtual Collection Points 8815 Centre Park Drive Publication Date: Oct 23, 2009 Columbia MD 21045 U.S. Toll Free: 877.333.1433 Abstract The purpose of this document is to help users understand Virtual
More informationMonitoring Clearswift Gateways with SCOM
Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue
More informationWeb Authentication Proxy on a Wireless LAN Controller Configuration Example
Web Authentication Proxy on a Wireless LAN Controller Configuration Example Document ID: 113151 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Proxy on
More informationGroundWork Monitor Open Source 5.1.0 Installation Guide
GroundWork Monitor Open Source 5.1 is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version
More informationUnity Express Voice Mail Transfer Behavior
Unity Express Voice Mail Transfer Behavior Document ID: 97825 Contents Introduction Prerequisites Requirements Components Used Conventions Problem 1 Calls Transfer to Reception Solution 1 Transfer to AutoAttendant
More informationHow To Configure Syslog over VPN
How To Configure Syslog over VPN Applicable Version: 10.00 onwards Overview Cyberoam provides extensive logging capabilities for traffic, system and network protection functions. Detailed log information
More informationLogLogic Cisco NetFlow Log Configuration Guide
LogLogic Cisco NetFlow Log Configuration Guide Document Release: September 2011 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 1.0, and LogLogic Software Release
More informationFixing Problems with IP Phone Services
Fixing s with IP Phone Services Document ID: 13959 Contents Introduction Prerequisites Requirements Components Used Conventions Change the URL Services in Cisco CallManager Reset the TFTP Server Reset
More informationACS 5.x and later: Integration with Microsoft Active Directory Configuration Example
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
More informationAbout this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management... 5. How to forward logs...
Connect With Confidence Astaro Log Management Getting Started Guide About this Getting Started Guide To use Astaro Log Management, logs need to be transferred from individual systems to the cloud. This
More informationEventSentry Overview. Part I About This Guide 1. Part II Overview 2. Part III Installation & Deployment 4. Part IV Monitoring Architecture 13
Contents I Part I About This Guide 1 Part II Overview 2 Part III Installation & Deployment 4 1 Installation... with Setup 5 2 Management... Console 6 3 Configuration... 7 4 Remote... Update 10 Part IV
More informationHP Operations Manager Software for Windows Integration Guide
HP Operations Manager Software for Windows Integration Guide This guide documents the facilities to integrate EnterpriseSCHEDULE into HP Operations Manager Software for Windows (formerly known as HP OpenView
More informationConfiguring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS
Configuring EtherChannel and 802.1Q Trunking Between Catalyst L2 Fixed Configuration Switches and Catalyst Switches Running CatOS Document ID: 23408 Contents Introduction Prerequisites Requirements Components
More informationLog Correlation Engine 4.6 Quick Start Guide. January 25, 2016 (Revision 2)
Log Correlation Engine 4.6 Quick Start Guide January 25, 2016 (Revision 2) Table of Contents Introduction... 4 Standards and Conventions... 4 Product Overview... 4 Prerequisites... 4 LCE Quick Start...
More informationCatalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example
Catalyst Layer 3 Switch for Wake On LAN Support Across VLANs Configuration Example Document ID: 91672 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
More informationTracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
More informationSIOS Protection Suite for Linux v8.3.0. Postfix Recovery Kit Administration Guide
SIOS Protection Suite for Linux v8.3.0 Postfix Recovery Kit Administration Guide July 2014 This document and the information herein is the property of SIOS Technology Corp. (previously known as SteelEye
More informationSymantec Event Collector 4.3 for Cisco PIX Quick Reference
Symantec Event Collector 4.3 for Cisco PIX Quick Reference Symantec Event Collector for Cisco PIX Quick Reference The software described in this book is furnished under a license agreement and may be used
More informationCSE/ISE 311: Systems Administra5on Logging
Logging Por$ons courtesy Ellen Liu Outline Introduc$on Finding log files Syslog: the system event logger Linux logrotate tool Condensing log files to useful informa$on Logging policies 13-2 Who and Why
More informationDS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x
DS License Server Installation and Configuration Guide 3DEXPERIENCE R2014x Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology Edition, Version
More informationIntegrated Cisco Products
Installation Guide Supplement for use with Integrated Cisco Products Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
More informationCisco PIX Firewall Manager FAQ
Cisco PIX Firewall Manager FAQ Document ID: 13816 Contents Introduction What are some general tips for the best PFM performance? Where can I get documentation on the PFM? Why does PFM not install? It says
More informationUnity 7.x Event Log Errors
Unity 7.x Event Log Errors Document ID: 112073 Contents Introduction Prerequisites Requirements Components Used Conventions Problem Cisco Unity Phrase Server Error Messages Unity 7.0(2) MWI Issues 1 2
More informationActive FTP vs. Passive FTP, a Definitive Explanation
Active FTP vs. Passive FTP, a Definitive Explanation Contents: Introduction The Basics Active FTP Active FTP Example Passive FTP Passive FTP Example Summary References Appendix 1: Configuration of Common
More informationNTP and Syslog in Linux. Kevin Breit
NTP and Syslog in Linux Kevin Breit Network Time Protocol (NTP) Synchronizes computer time with highly accurate time services NTP Architecture Utilizes time server hierarchy. Each level is called a stratum.
More informationLinux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
More informationEMC AVAMAR 6.0 GUIDE FOR IBM DB2 P/N 300-011-636 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.
EMC AVAMAR 6.0 FOR IBM DB2 GUIDE P/N 300-011-636 REV A01 EMC CORPORATION CORPORATE HEADQUARTERS: HOPKINTON, MA 01748-9103 1-508-435-1000 WWW.EMC.COM Copyright and Trademark Notices Copyright 2002-2011
More informationASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example
ASA 8.3 and Later: Mail (SMTP) Server Access on Inside Network Configuration Example Document ID: 113336 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
More informationKiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.
Kiwi SyslogGen A Freeware Syslog message generator for Windows by SolarWinds, Inc. Kiwi SyslogGen is a free Windows Syslog message generator which sends Unix type Syslog messages to any PC or Unix Syslog
More informationSiebel Installation Guide for UNIX. Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014
Siebel Installation Guide for UNIX Siebel Innovation Pack 2013 Version 8.1/8.2, Rev. A April 2014 Copyright 2005, 2014 Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationDell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
More informationConfiguring Apache HTTP Server as a Reverse Proxy Server for SAS 9.2 Web Applications Deployed on BEA WebLogic Server 9.2
Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.2 Web Applications Deployed on BEA WebLogic Server 9.2 This document describes how to configure Apache HTTP Server
More informationSQL Tuning and Maintenance for the Altiris Deployment Server express database.
Article ID: 22953 SQL Tuning and Maintenance for the Altiris Deployment Server express database. Question Now Deployment Server is installed how do I manage the express database? Topics that will be covered
More informationConfiguring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
More informationChecking SQL Server or MSDE Version and Service Pack Level
Checking SQL Server or MSDE Version and Service Pack Level Document ID: 25784 Contents Introduction Prerequisites Requirements Components Used Conventions Use Query Analyzer with Use Query Analyzer with
More informationPIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example
PIX/ASA 7.x and above: Mail (SMTP) Server Access on the DMZ Configuration Example Document ID: 69374 Contents Introduction Prerequisites Requirements Components Used Conventions Configure Network Diagram
More informationPIX/ASA: Upgrade a Software Image using ASDM or CLI Configuration Example
PIX/ASA: Upgrade a Software Image using ASDM or CLI Configuration Example Document ID: 69984 Contents Introduction Prerequisites Requirements Components Used Related Products Conventions Download Software
More informationfåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.
More informationCHANGES IN GECS 3.50 PACKAGES
CHANGES IN GECS 3.50 PACKAGES GECS version 3.50 started shipping January 20 th, 2005. You can find the date of the last GECS package installed by looking in the file named PKGDATE.TXT located in your GECS
More informationLinux System Administration. System Administration Tasks
System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,
More information