• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 519
  • Last Modified:

How to enable and view IPSEC VPN on Cisco ASA 5510?

Hi there,

How can I enable logging for IPSEC VPN on Cisco ASA 5510 and then view and filter by username and date range?

Thanks.
CB
0
czarbapora
Asked:
czarbapora
  • 5
  • 4
1 Solution
 
asavenerCommented:
You want to see who uses your remote access VPN?
0
 
asavenerCommented:
Command line to see who's currently on:

sh vpn-sessiondb remote

Otherwise, log "warning" messages and above to a syslog and then check the log.
0
 
czarbaporaAuthor Commented:
Not currently on. I want to find a user who was on the VPN last month.
0
Will You Be GDPR Compliant by 5/28/2018?

GDPR? That's a regulation for the European Union. But, if you collect data from customers or employees within the EU, then you need to know about GDPR and make sure your organization is compliant by May 2018. Check out our preparation checklist to make sure you're on track today!

 
asavenerCommented:
How do your users authenticate?

Unless you were keeping logs already, I think the data is gone.
0
 
czarbaporaAuthor Commented:
Through Cisco VPN Client
0
 
asavenerCommented:
No, that's where they enter their credentials.  The ASA should have an authentication method assigned to the remote access VPN.  (Typically, it's user accounts on the ASA, a RADIUS server, or Kerberos/Active Directory.)
0
 
czarbaporaAuthor Commented:
You are correct, users authenticate with the user account on the ASA.

Thanks.
0
 
asavenerCommented:
OK.

Then user authentication would be logged on the ASA.  By this time, the buffer will be flushed, so your only hope is that the ASA sends log entries to a syslog server.
0
 
czarbaporaAuthor Commented:
Thank you.
0

Featured Post

Managing Security & Risk at the Speed of Business

Gartner Research VP, Neil McDonald & AlgoSec CTO, Prof. Avishai Wool, discuss the business-driven approach to automated security policy management, its benefits and how to align security policy management with business processes to address today's security challenges.

  • 5
  • 4
Tackle projects and never again get stuck behind a technical roadblock.
Join Now