View syslog Messages
![15406|644x281](upload://b0ea1HLXqNaYqHycUmg01nYFTeS.jpeg)
![15407|630x142](upload://hF7RQy5JP0kpS06TmOWN1Mjsfst.jpeg)
In this activity, you will use Packet Tracer to sniff and log network traffic. You will view a security vulnerabilityin one network application, and view logged ICMP traffic with syslog.
Step 1. Remotely connect to Router2.
a. From the PC-B command line, telnet to Router2.
b. Use the username ADMIN and password CISCO for authentication.
c. Enter the following commands at the router prompt:
Router2# debug ip icmp
d. Type logout at the prompt to close the Telnet session.
Step 2. Generate and view the syslog messages.
a. Click on the SYSLOG_SERVER device and go to the Services tab.
b. Click the SYSLOG service. Verify that the service is on. Syslog messages will appear
here.
c. Go to host PC-B and open the Desktop tab.
d. Open the Command Prompt and ping Router2.
e. Go to host PC-A and open the Desktop tab.
f. Go to the Command Prompt and ping Router2.
g. On the syslog server investigate the logged messages.
h. There should be four messages from PC-A and four from PC-B. Can you tell which
echo replies are for PC-A and PC-B from the destination addresses? Explain.
They should both have the same destination address because NAT is translating internal
private addresses to a global public address.
Note: The HostName field in the syslog server display refers to the device that is the source of the syslog messages.
i. Ping Router2 from PC-C.
What will the destination address for the replies be?
The address will be the internal private address of PC-C.
![15408|626x161](upload://eyYNMxiD3l3ofATS3HBCxXspCQN.jpeg)
You might also like to view...
The discrete probability function that has wide business applications is the ________ distribution
A) binomial B) exponential C) normal D) Poisson
What are the psychological depth cues for human perception?
What will be an ideal response?