Solved

Active VPN connections

Posted on 2011-02-20
1
464 Views
Last Modified: 2012-05-11
Cisco ASA 5505
Microsoft 2008 NPS

VPN users authenticate to Cisco using AD and NPS.

Is there a tool out there that I can use to monitor connections? I want to log the VPN connections and length of time, possibly even amount of data transferred/received.

0
Comment
Question by:shankshank
1 Comment
 
LVL 42

Accepted Solution

by:
kevinhsieh earned 500 total points
Comment Utility
The ASA can show you that information for active VPN sessions. Just login to the ASA using the GUI ASDM and go to monitoring VPN connections. For historical information you would need to have the ASA send syslog messages to a syslog server which can then store the raw log information and hopefully present it to you in a useful format. A basic syslog server is Kiwi <http://www.kiwisyslog.com> . You could have Kiwi email you every time a VPN connection closed, which would include session time, user, and bytes transferred, For something that shows you a useful report you would need a logging tool with a reporting feature such as LogLogin, LogRhythm, HP ArcSight, Dell SecureWorks, possibly Splunk, AlienVault, etc. Who knows, maybe someone has already written an open source tool to go through the syslog to pull out the information.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

If you migrate a Terminal Server licenses server inside the 2008 server family, you can takte advantage of the build-in migration tool. If you like to migrate an older 2003 Server (and the installed client CALs) to a 2008 R2 server for example, you …
I was supporting a handful of Windows 2008 (non-R2) 2 node clusters with shared quorum disks. Some had SQL 2008 installed and some were just a vendor application that we supported. For the purposes of this article it doesn’t really matter which so w…
This tutorial will walk an individual through locating and launching the BEUtility application and how to execute it on the appropriate database. Log onto the server running the Backup Exec database. In a larger environment, this would generally be …
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now