router(config)#hostname blablabla
router(config)#logging on
router(config)#logging traps (whatever level you choose---do a "?" for your choices. I do debugging myself to see everything)
router(config)#logging host x.x.x.x---the ip address of the syslog server
router(config)#logging buffered (number---if logging to a syslog server, I would reduce this to 4096 rather than the default of 65536 to save on memory resources)
You can do
router(config)#logging ?
for the other choices, but what I have posted are the minimum
I use Kiwi (free version) syslog server daemon and it works GREAT.
/
tim@tim-laptop ~ $ sudo apt-get install windows
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Couldn't find package windows...Thank Goodness!
You can filter things---you'll have to play with it. I log everything (level 7, debugging), and here is a sample...it's easy to spot an attack---look for warning...
Info lets you know about acl hits, notifications will tell you about config changes, and warnings will tell you about an IPS signature being matched.
You can set Kiwi up to email you (like your phone) when a warning comes up. The acl hits are no worry---script kiddies trying to ftp or html into your router---easily blocked with an acl---just allow what you need in, block the rest.
/
tim@tim-laptop ~ $ sudo apt-get install windows
Reading package lists... Done
Building dependency tree
Reading state information... Done
E: Couldn't find package windows...Thank Goodness!
I can imagine a lot of warning being generated and getting so many that they get over-looked, i guess thats where "the tinkering around" part comes into play.
So you run IPS on your router huh?
I'm thinking about turning it on my ISR, but didnt know if its common deployment. Is it pretty common for most place to have that running on there edge, and do you just use the built in signatures?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.