Setting up Syslog for Network Monitoring
Nerd Cafe
Syslog is a crucial protocol for logging network events, enabling administrators to monitor and troubleshoot network devices like routers and switches. In this guide, we will:
Explain Syslog fundamentals
Set up a Syslog server
Configure Cisco devices to send logs to the Syslog server
Verify and monitor Syslog messages
Step 1: Understanding Syslog
Syslog is a logging protocol used by network devices to send event messages to a centralized Syslog server.
Syslog Components:
Syslog Server – Collects and stores logs (e.g., a Linux/Windows server running Syslog software)
Syslog Clients – Cisco routers/switches sending logs to the Syslog server
Severity Levels:
0: Emergency (System is unusable)
1: Alert (Immediate action needed)
2: Critical (Serious issues)
3: Error (General errors)
4: Warning (Potential issues)
5: Notification (Normal but significant events)
6: Informational (Routine messages)
7: Debugging (Detailed logs for troubleshooting)
Step 2: Scenario & Topology
Scenario:
You are a network administrator and want to monitor logs from routers and switches using a Syslog server. You will set up a Syslog server on a PC and configure network devices to send logs to this server.
Topology:

Tools Needed:
Cisco Packet Tracer (or GNS3/real devices)
A Syslog server software (Kiwi Syslog, Rsyslog, or Syslog-ng)
Step 3: Setting Up the Syslog Server
On a PC (Windows/Linux):
Download Syslog Server:
Windows: Install Kiwi Syslog Server
Linux: Use
rsyslog(sudo apt install rsyslog)
Configure the Syslog Server:
Open the Syslog software and ensure it's listening on UDP port 514
Set log storage options (e.g., save logs to a file)
Start the Syslog service
Step 4: Configure Syslog on Cisco Devices
1. Basic Router (R1) Configuration
R1#configure terminal
R1(config)#interface fastEthernet 0/0
R1(config-if)#ip address 192.168.202.1 255.255.255.0
R1(config-if)#no shutdown
R1(config-if)#^Z
R1#ping 192.168.202.10
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.202.10, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 4/9/12 ms
R1#ping 192.168.202.100
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.202.100, timeout is 2 seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 4/9/20 ms
R1#2. Enable Logging:
R1(config)#logging on3. Set the Syslog Server IP
R1(config)#logging 192.168.202.104. Specify the Logging Severity Level
R1(config)#logging trap ?
<0-7> Logging severity level
alerts Immediate action needed (severity=1)
critical Critical conditions (severity=2)
debugging Debugging messages (severity=7)
emergencies System is unusable (severity=0)
errors Error conditions (severity=3)
informational Informational messages (severity=6)
notifications Normal but significant conditions (severity=5)
warnings Warning conditions (severity=4)
<cr>
R1(config)#logging trap informational5. Enable Timestamps (for better analysis)
/R1(config)#service timestamps log ?
datetime Timestamp with date and time
uptime Timestamp with system uptime
<cr>
R1(config)#service timestamps log datetime ?
localtime Use local time zone for timestamps
msec Include milliseconds in timestamp
show-timezone Add time zone information to timestamp
year Include year in timestamp
<cr>
R1(config)#service timestamps log datetime msec6. On the Switch (SW1):
Enable Logging
Sw1(config)#logging onSet the Syslog Server IP
Sw1(config)#logging 192.168.202.10Specify Severity Level (E.g., Warnings and above)
Sw1(config)#logging trap ?
<0-7> Logging severity level
alerts Immediate action needed (severity=1)
critical Critical conditions (severity=2)
debugging Debugging messages (severity=7)
emergencies System is unusable (severity=0)
errors Error conditions (severity=3)
informational Informational messages (severity=6)
notifications Normal but significant conditions (severity=5)
warnings Warning conditions (severity=4)
<cr>
Sw1(config)#logging trap warningsEnable Console Logging
Sw1(config)#logging consoleStep 5: Verify Syslog Configuration
On the Router/Switch:
Check Syslog Configuration:
R1# show loggingOutput should show the configured Syslog server (192.168.1.100).
Generate a Log Message Manually (For Testing):
R1(config)#interface fastEthernet 1/0
R1(config-if)#shutdown
R1(config-if)#no shutdownStep 6: Monitor Logs on the Syslog Server
Open your Syslog server software
Check if logs from R1 and SW1 are being received
If logs do not appear:
Ensure firewall allows UDP 514
Check connectivity (
ping 192.168.1.100from router)Verify
show loggingoutput

Step 7: Automating Log Analysis
For better network monitoring, use SIEM tools (e.g., Splunk, Graylog) to analyze logs and detect security threats.
Keywords
Syslog, network monitoring, Cisco CCNA, logging, router logs, switch logs, Syslog server, Kiwi Syslog, rsyslog, network security, log analysis, troubleshooting, UDP 514, event logging, logging levels, Cisco configuration, Packet Tracer, network management, log messages, SIEM tools, سیسکو
Last updated