We help IT Professionals succeed at work.

finding out about pix config changes in syslog logs..

eggster34
eggster34 asked
on
349 Views
Last Modified: 2010-04-09
Hi there
I have a pix 506 firewall that I am monitoring through syslogs.
I have a 600 MB syslog file for the last 10 days. during those 10 days, somebody made some config changes to the firewall and now something's not working.
How can I analyze the syslog file to find out who did what? (other people have access to the pix besides me.)

I use sawmill to analyze syslogs for traffic patterns / anomalies etc.
is there a program which would analyze the syslogs for config changes?

P.S. the syslogs are debug level, which is supposed to capture everything right?
Comment
Watch Question

This one is on us!
(Get your first solution completely free - no credit card required)
UNLOCK SOLUTION

Gain unlimited access to on-demand training courses with an Experts Exchange subscription.

Get Access
Why Experts Exchange?

Experts Exchange always has the answer, or at the least points me in the correct direction! It is like having another employee that is extremely experienced.

Jim Murphy
Programmer at Smart IT Solutions

When asked, what has been your best career decision?

Deciding to stick with EE.

Mohamed Asif
Technical Department Head

Being involved with EE helped me to grow personally and professionally.

Carl Webster
CTP, Sr Infrastructure Consultant
Empower Your Career
Did You Know?

We've partnered with two important charities to provide clean water and computer science education to those who need it most. READ MORE

Ask ANY Question

Connect with Certified Experts to gain insight and support on specific technology challenges including:

  • Troubleshooting
  • Research
  • Professional Opinions
Unlock the solution to this question.
Join our community and discover your potential

Experts Exchange is the only place where you can interact directly with leading experts in the technology field. Become a member today and access the collective knowledge of thousands of technology experts.

*This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

OR

Please enter a first name

Please enter a last name

8+ characters (letters, numbers, and a symbol)

By clicking, you agree to the Terms of Use and Privacy Policy.