You will probably want to look at Secure Device Manager (SDM) for your router. It's a free download from Cisco, that is a web based checklist for Cisco router security.
I have logging enabled on the router as shown:
logging trap notifications
logging facility local6
logging source-interface Loopback0
logging 10.1.190.8
where "10.1.190.8" is my syslog server. This sends most log messages (those with severity "nofitication" or higher).
ACL logging happens by appending "log" to the entry. So,
"access-list 101 deny ip 10.0.0.0 0.255.255.255 any log"
would deny access from anything in the 10.x network and log the offending entry to the log server shown above.
Linux has syslog built in. For Windows you can use Kiwi (
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.