> logging console
>
> should get what you need on a cisco. Might have to set that serial port
> to no password, which brings up an additional home if physical security
> is a concern.
>
> --Rich
What about the cisco that's 35 miles away?
I'm thinking with what these cisco's do, and actually log,
Mike Dresser wrote:
>
> I was thinking of using a digiboard on the syslog machine, and connecting
> a serial link to each server. However, that doesn't help me on stuff like
> cisco's and jetdirect boxes that can only output syslog over ethernet.
logging console
should get what you need on a
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Fri, Jun 14, 2002 at 10:13:09AM -0400, Mike Dresser wrote:
> I've done some looking around on the web, and haven't really found an
> answer to the following question.
>
> How do you securely handle syslogging when you have servers in the DMZ,
> and
I've done some looking around on the web, and haven't really found an
answer to the following question.
How do you securely handle syslogging when you have servers in the DMZ,
and then the servers that are inside on the internal network? Seems that
the fundamental rule is never allow internal lan
4 matches
Mail list logo