11.2.3.11 Packet Tracer - Logging From Multiple Instructions
11.2.3.11 Packet Tracer - Logging From Multiple Instructions
Topology
Objectives
Part 1: Use syslog to capture log files from multiple network devices
Part 2: Observe AAA user access logging
Part 3: Observe NetFlow information
Background / Scenario
In this activity, you will use Packet Tracer to view network data generated by syslog, AAA, and NetFlow.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 1 of 4 www.netacad.com
Packet Tracer – Logging from Multiple Sources
debugging (7). Syslog clients can be configured to ship log entries to syslog servers based on the severity level.
a. Click the Syslog Server to open its window.
b. Select the Services tab and select SYSLOG from the list of services shown on the left.
c. Click On to turn on the Syslog service.
d. Syslog entries coming from syslog clients will be shown in the window on the right. Currently, there are no entries.
e. Keep this window open and visible and move on to Step 2.
the EIGRP autonomous system number, timestamp for the message and the source of the
message.
Cisco and/or its affiliates. All rights reserved. Cisco Confidential Page 3 of 4 www.netacad.com
The log entry will resemble: DATE= 09:56:31 UTC Apr 05 2017,Username= admin,Caller Id=,Flag=
The entry contains the timestamp for when the event occurred, the username and password used, R2’s IP
address (the device used for the login attempt) and a Start flag. The Start flag indicates that the analyst user
logged in at the time shown.
The flow information includes the percentage of traffic that the flow represents, the source and
destination addresses, IP protocol information, TCP flags, timestamps, and other information.
Note: The pie charts displayed will vary based on the traffic on the network. Other packets flows, such as EIGRP-
related traffic, are being sent between devices. NetFlow is capturing these packets and exporting statistics to the
NetFlow Collector. The longer NetFlow is allowed to run on a network, the more traffic statistics will be captured.
Reflection
While the tools presented in this activity are useful, each one has its own service and may need to run on totally
different devices. A better way, explored later in the course, is to have all the logging information be concentrated
under one tool, allowing for easy cross-reference and powerful search capabilities. Security information and event
management (SIEM) platforms can gather log files and other information from diverse sources and integrate the
information for access by a single tool.