Most devices use the syslog and SNMP protocol to manage system logs, events and alerts. As an example, this section offers a brief guide for setting up Cisco devices logging to NetVizura server. For more detailed information, refer to the Cisco website.

Before configuring a Cisco device to send syslog messages, make sure that it is configured with the right date, time, and time zone. Syslog data would be useless for troubleshooting if it shows the wrong date and time.

Configuring Cisco Routers for Syslog

  1. Router# configure terminal - Enters global configuration mode.

  2. Router(config)# service timestamps type datetime [msec] [localtime] [show-timezone] - Instructs the system to timestamp syslog messages.

  3. Router(config)# logging host [transport] [udp] [port port-num] Specifies the syslog server by IP address or host name; you can specify multiple servers. 
  4. Router(config)# logging trap levelSpecifies the kind of messages, by severity level, to be sent to the syslog server. The default is informational and lower. Possible values are emergencies: 0, alerts: 1, critical: 2, error: 3, warnings: 4, notifications: 5, informational: 6, debugging: 7.
  5. Router(config)# logging facility facility-typeSpecifies the facility level used by the syslog messages; the default is local7
  6. Router(config)# end - Returns to privileged EXEC mode.

  7. Router# write memory - Save the settings.
  8. Router# show logging - Display the addresses and levels associated with the current logging setup, and any other logging statistics.
Use the debugging level with caution when configuring logging trap level, because it can generate a large amount of syslog traffic in a busy network.


Router-Netvizura# configure terminal
Enter configuration commands, one per line. End with CTRL/Z.
Router-Netvizura(config)# logging
Router-Netvizura(config)# service timestamps debug datetime localtime show-timezone msec
Router-Netvizura(config)# logging facility local7
Router-Netvizura(config)# logging trap notifications
Router-Netvizura(config)# end
Router-Netvizura# write memory Router-Netvizura# show logging

Configuring Cisco Routers for SNMP Trap

  1. Router# configure terminal - Enters global configuration mode.

  2. Router(config)# snmp-server community snmp_community_string <ro or wr> - Specifies the read-only or write-read SNMP community string.

  3. Router(config)# snmp-server host IP_Address version <1 or 2c> snmp_community_string - Specifies the IP Address of the device to which the traps have to be sent along with SNMP version and SNMP community string.

  4. Router(config)# snmp-server enable traps [notification-type] [notification-option] - Specifies the SNMP trap types if you do not want to send all traps to server.

  5. Router(config)# end - Returns to privileged EXEC mode.

  6. Router# write memory - Save the settings.


Router-Netvizura# configure terminal
Enter configuration commands, one per line. End with CTRL/Z.
Router-Netvizura(config)# snmp-server community public ro
Router-Netvizura(config)# snmp-server host version 2c public
Router-Netvizura(config)# snmp-server enable traps ospf
Router-Netvizura(config)# end 
Router-Netvizura# write memory 
On this page:

Default destination port number on Cisco devices for syslog export is 514. Default port number for receiving syslog on Netvizura is 33514. If your server does not forward port 514 to 33514, you have to set 33514 for syslog destination port on your devices.

For configuring SNMP community in Netvizura application, refer to SNMP Policy Settings.