Summary

This chapter showed you the basics of logging on your Cisco perimeter router. Without logging, it becomes almost impossible to determine whether your network or router is under attack. Setting up logging with the logging commands is a simple and straight-forward process, even with the configuration of extra features such as NTP and ESM.

Next up is Part VIII, "Virtual Private Networks," which shows you how to establish secure connections between your perimeter routers across a public network.