06-28-2016 12:26 AM - edited 03-10-2019 01:09 PM
Hi Team,
I am trying to get the syslogs through PRTG tool and i configured the correct community string into the tool. but i couldn't get logs in server. I had configured the following commands,(Version 15.1(02)SY01 [ Rel 1.1], RELEASE SOFTWARE)
logging trap debugging
logging facility local1
logging host x.x.x.x
!
snmp-server community xxxxx RO
snmp-server community xxxxxx RO
snmp-server enable traps syslog
Note : I had configured the same commands into the another site 6K switch, that is working fine.(Version 12.2(50r)SYS3, RELEASE SOFTWARE (fc1))
Kindly advise.
Regards,
Bala
06-28-2016 01:48 AM
syslog does not use snmp.
Here is the PRTG guide.
https://www.paessler.com/manuals/prtg/syslog_receiver_sensor
On your Cisco box add something like (where a.b.c.d is your PRTG sensor IP address):
logging host a.b.c.d
06-28-2016 04:27 AM
Thanks Philip, I agreed with your comment, i had deployed the same comment into the another device, it is working find and getting alert, but same model, different switch is not working.
06-28-2016 12:48 PM
If you do a "show log" does it report it is sending it to your syslog host?
06-28-2016 09:17 PM
No , its not sending to syslog host
I cross checked with 2 devices into the tool, configuration its same.I am suspecting the problem could be in switch configuration side.
06-29-2016 12:54 PM
hi balamurugan48011:
configuration seems fine, I am also using 6k series and it is working fine with it, is it possible to perform "debug snmp packets" and put "terminal monitor" and see if you are getting any response? if not kindly check the ACL(s) maybe somehow in the configuration you are blocking UDP port 161 (for general SNMP message) and 162 (for TRAP SNMP messages)
Kindest Regards,
Uzair
07-07-2016 12:28 AM
Hi Uzair,
Thanks for your reply, if i am doing terminal monitor, i can able to see the configuration changes into the switch side, but not in syslog.
Here i have copied my ACL, please check if anything related to block
Extended IP access list acl-copp-match-igmp
10 permit igmp any any
Extended IP access list acl-copp-match-pim-data
10 deny pim any host 224.0.0.13
20 permit pim any any
IPv6 access list acl-copp-match-mld
permit icmp any any mld-report sequence 10
permit icmp any any mld-query sequence 20
permit icmp any any mld-reduction sequence 30
permit icmp any any 143 sequence 40
IPv6 access list acl-copp-match-ndv6
permit icmp any any nd-na sequence 10
permit icmp any any nd-ns sequence 20
permit icmp any any router-advertisement sequence 30
permit icmp any any router-solicitation sequence 40
permit icmp any any redirect sequence 50
IPv6 access list acl-copp-match-pimv6-data
deny 103 any host FF02::D sequence 10
permit 103 any any sequence 20
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide