In this blog entry I will outline the steps you need to take on your Cisco Router or Catalyst device to configure syslog logging.

If you are configuring a Cisco Router for syslog logging then please follow the steps below:

1. In order to ensure that logging is enabled, issue the logging on command.

Router(config)# logging on

2. In order to specify the Essentials server that is to receive the router syslog messages, issue the logging ip_address command. ip_address is the address of the server that collects the syslog messages.

Router(config)# logging

This blog entry Im writing with the intention of being short and to the point on how to backup your HPUX system. For additional information or more in depth options and so on, please consult the URLs listed at the bottom of this entry.

If you have root access to the machine then you can use the fbackup utility to backup your data. It is best to first boot the machine in single user mode so that no services are running and the bare minimum of processes are active because the fbackup utility will not back up files that are open or locked by any process.

So now make sure the device which you are backing your data up to is properly connected and turned on. Then use the fbackup command like so:

fbackup –f /dev/mymedia –i /

If you have worked with AIX you may have come across the term HACMP (High Availability Cluster Multi-Processing). This is IBM's solution for high-availability clusters. One of the first things to understand about HACMP is heartbeating, which I will discuss in this blog post.

Extended Access Control Lists (ACL) control traffic by comparing the source and destination address of the IP packets to whichever addresses you have configured within the ACL.

A standard ACL only compares the source address of the IP packet to whichever address is configured in the ACL and allows or denies it based on the ACL, the destination of the packet and the ports involved do not matter. A standard ACL also does not have the ability to filter based on the protocol type, whereas with an extended ACL you can filter IP, ICMP, TCP and UDP packets individually and specify specific ports.

When meshing Linux machines into a Windows environment that is apart of an Active Directory Domain you will most likely run into the question "How do I join my samba client to the AD domain?". Well this can be easily answered and solved with a little bit of time and configuration on your Linux machine. First make sure that an entry for your AD domain server resides the /etc/hosts file.