Skip to content
Discussion options

You must be logged in to vote

happy to hear that the info is helping... The only other thing I do is use tcpdump to make sure they are all coming in. For example, like you, I also initially permitted 10.0.0.0/8 for my Cisco_ios logs on port 9002. However after looking at tcpdump I realize the source-ip that cisco was using was a loopback ip which is a 172.16.10.0/24 ip address. What I am saying is, tcpdump is handy to verify that the packets are coming in the wire.. I now I change my firewll port to permit 0.0.0.0/0 for udp:9002 to cover everything. I use the following tcpdump syntax, with ens192 as my management interface.

tcpcump -i ens192 -nnA port 2055

Replies: 2 comments 2 replies

Comment options

You must be logged in to vote
0 replies
Comment options

You must be logged in to vote
2 replies
@TotieBash
Comment options

Answer selected by nomadicnerd42
@nomadicnerd42
Comment options

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
2.4
Labels
None yet
2 participants