Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Enabling syslog informational logging without seeing VPN teardowns

Posted on 2009-04-01
3
Medium Priority
?
345 Views
Last Modified: 2012-05-06
Is there a way to setup syslogging on a pix or asa, so that my syslog server doesn't get flooded with VPN information?  Right now it is set to emergencies. Because when I use the informational type of logging, I get all of the VPN info.

I just want to see log ins, log outs, user changes etc etc.

Thanks in advance
0
Comment
Question by:dissolved
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 10

Accepted Solution

by:
stsonline earned 2000 total points
ID: 24052629
The easiest way would be to configure the firewall to exclude certain messages by ID - check out this link on Cisco's web site:

http://www.cisco.com/en/US/docs/security/asa/asa80/system/message/logmsgs.html

0
 

Author Closing Comment

by:dissolved
ID: 31568638
can you give me an example command?
0
 
LVL 10

Expert Comment

by:stsonline
ID: 24188409
Sure... you enter the message ID you do NOT want to record one line at a time prefixed by the word 'no'. For example, if you don't care about a VPN client with no split-tunneling enabled and don't want to know when a Phase 1 retrans or keep-alive is received, you'd get into configuration mode and create four entries, one each for message ID 611301, 611302, 702204, and 715075:

no logging message 611301
no logging message 611302
no logging message 702204
no logging message 715075

0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …
Suggested Courses

670 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question