09-28-2004
I have tried this option but still it is not working.
My linux version is Redhat.
The only thing I couldn't understand is how to enable remote reception over UDP using the -r option.
I beleive the redhat server syslog is by default enables remote logging for all incoming request.
Please explain me more elaborately
6 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
i'm having some problems with syslogging.
i figured out how to allow logging from a specific host (my webramp).
syslogd -a ipaddress subnetmask
first, what file do the logs go to? second, is there anyway i can save the webramp logs into another file? (13 Replies)
Discussion started by: xyyz
13 Replies
2. Linux
Hi,
I have different Linux server which connected via LAN ( Cisco switch and fire wall ).
Which is the best way to check the performance of LAN ?
e.g. permanent traces on Cisco switch or firewall
or sar check and compare the parameters like CPU load, I/O performance and so on
Best... (1 Reply)
Discussion started by: rhacodactylus
1 Replies
3. IP Networking
Dear All,
I have worked with xDSL routers working in bridged mode, and linux behind them working as a Firewall utilizing IPTABLES. My question is, how this will change if the xDSL router is replaced with a Cisco Router?
I mean to ask that, can I assign a public ip on the linux machine, which... (0 Replies)
Discussion started by: tmm
0 Replies
4. UNIX for Advanced & Expert Users
Hello,
I am using Ubuntu Linux and having problems in setting up remote syslogging. Appreciate your help on this.
On the server unix host, I have made following changes.
uncommented following lines in /etc/rsyslog.conf
$ModLoad imudp
$UDPServerRun 514
Now i am trying to run rsyslog in... (0 Replies)
Discussion started by: ravi.videla
0 Replies
5. IP Networking
Hi,
I am trying to establish vpn between my linux server and cisco asa at client side.
I installed openswan on my cent os.
Linux Server
eth0 - 182.2.29.10
Gateway - 182.2.29.1
eth1 - 192.9.200.75
I have simple IPtables Like
WAN="eth0"
LAN="eth1" (0 Replies)
Discussion started by: ashokvpp
0 Replies
6. IP Networking
Is there an easy way to stack Cisco 2960-S and Cisco 2960X switches? If you have no idea, follow this:
1. Stacking is not supported on switches running the LAN Lite image. All switches in the stack must be running the LAN Base image.
2. In a mixed stack of Catalyst 2960-X and Catalyst 2960-S... (0 Replies)
Discussion started by: Ayaerlee
0 Replies
LEARN ABOUT OSF1
syslog.auth
syslog.auth(4) Kernel Interfaces Manual syslog.auth(4)
NAME
syslog.auth - authorization file for accepting remote syslog messages
SYNOPSIS
# format: Each fully qualified host name on a separate line hostname.domain_name
DESCRIPTION
The /etc/syslog.auth file specifies which remote hosts are allowed to forward syslog messages to the local host. For the sake of security,
only messages coming from remote hosts listed in the local /etc/syslog.auth file will be logged by the syslogd daemon.
If the /etc/syslog.auth file does not exist, then messages coming from any host will be accepted.
Each remote host name should appear in a separate line in /etc/syslog.auth. A line started with the # character is considered as a comment
and is thus ignored.
A host name must be a complete domain name such as trout.zk3.dec.com. If a domain host name is given, it must either appear in the local
/etc/hosts file or be able to be resolved by the local name server (BIND).
Note that a host name can have at most as many characters as defined by the MAXHOSTNAMELEN constant in <sys/param.h>, although each line
in the /etc/syslog.auth file can have up to 512 characters.
The /etc/syslog.auth file must be owned by root and has a permission of 0600.
To invoke a new version of the /etc/syslog.auth file, run the following command (as the super user) to initialize the syslogd daemon: kill
-HUP `cat /var/run/syslog.pid`
EXAMPLES
The following example provides a typical authorization file: # format: Each fully qualified host name on a separate line
c3poid.rvo.dec.com r2d2id.ckt.dec.com
FILES
Location of the authorization file.
RELATED INFORMATION
Commands: syslogd(8), syslog(1)
System Administration delim off
syslog.auth(4)