Using Syslog - Chapter 4 of Network Administrators Survival Guide

"Using Syslog" from Network Administrators Survival Guide by Anand Deveriya presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.

Network Administrators Survival Guide
 

Network Administrators Survival Guide by Anand Deveriya solves many common network administration problems by providing administrators with an all-in-one practical guide to supporting Cisco networks using freeware tools. Based on author Anand Deveriya's extensive field experience, this practical guide to maintaining Cisco networks is designed to save you significant time and money.

Chapter four presents an overview of the syslog protocol and shows you how to deploy an end-to-end syslog system. You'll learn about the syslog architecture as well as the issues in deploying syslog servers in Linux and Windows OSs with a focus on their relevance in a Cisco environment.

Read the rest of the excerpt in this PDF.

(Reproduced from the book Network Administrators Survival Guide, ISBN 1587052113, Copyright 2005, Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses. Visit www.ciscopress.com for a detailed description and to learn how to purchase this title.)

This was last published in January 2006

Dig Deeper on Networking careers and certifications

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

SearchUnifiedCommunications

SearchMobileComputing

SearchDataCenter

  • How do I size a UPS unit?

    Your data center UPS sizing needs are dependent on a variety of factors. Develop configurations and determine the estimated UPS ...

  • How to enhance FTP server security

    If you still use FTP servers in your organization, use IP address whitelists, login restrictions and data encryption -- and just ...

  • 3 ways to approach cloud bursting

    With different cloud bursting techniques and tools from Amazon, Zerto, VMware and Oracle, admins can bolster cloud connections ...

SearchITChannel

Close