Cisco Prime Infrastructure - syslog based config download for FWSM
I'm using Cisco PI 2.0 for monitoring FWSM modules. FWSMs are discovered, modeled and configurations are successfully downloaded from them. I'd like to set up config download when a syslog message is received from FWSM. Syslog message is in fact configuration change event. It works for other Cisco devices (switches, routers,...) but I can't get it work on FWSMs.
FWSM sends this syslog message when user enters and exits config mode:
%FWSM-5-111008: User 'user' executed the 'configure terminal' command.
Can PI react to this message or PI currently doesn't have support for it?
Other Cisco devices react to this syslog message:
%SYS-5-CONFIG_I: Configured from console by user on vty0 (10.1.1.1)
One thing I've noticed and which I have to clarify. What is 'configuration change event'? I thought it is an event generated when user enters and exits config mode but looking at my devices I see it's not. I've got an example where PI downloaded device config after receiving interface up/down syslog messages. Can somebody please explain this behavior?
PRTG system in place running other sensors on the same host, which are working. Ive added syslog receiver sensor and receiving PRTG data from switch that increases drops, errors and warning stats that disappear after a few minutes. Within mess...
Hi, here is an example how to configure IP-NAT, GRE, IPSEC. I've seen plenty of questions and this might be a good solution! (Mostly the use of commands that might remind u) IP NAT======================================================================...
Hi everyone.I have a problem in my Network.So i have 3 routers and a firewall in my topology. I have configured OSPF and all routers works expect R3 (see in the image below)When I watch my neignbor in R3 it says :192.168.7.7 1 INIT/DROTHER 00:00:37 10.0.2...
Host Onboarding is the term used when connecting an endpoint (hosts , IOT , Other devices) to the fabric , and can be accomplished in a couple of ways.One option is the "static" approach as oppose to the dynamic and secure approach using&nbs...