Solved

cisco ASA syslog issue

Posted on 2014-01-27
5
614 Views
Last Modified: 2014-02-17
Hi,

 can we get history of users logged into cisco ASA including login period & logout time both

With out syslog server , can we see the history  in a firewall..
Is there any commands to see or any logging related configuration..?

regards
Ram
0
Comment
Question by:RAMU CH
  • 2
  • 2
5 Comments
 
LVL 57

Expert Comment

by:Pete Long
ID: 39811595
Ram

This is usually a feature of AAA rather than syslog?


Pete
0
 
LVL 8

Accepted Solution

by:
amatson78 earned 500 total points
ID: 39812440
The ASA does not have a long term log, anything including AAA and others. The default buffer for logging (Configuration > Device Management > Logging > Logging Setup is 4096 bytes. You can also save the buffer to FTP or email or send it via Syslog. This is the best way.

For the login messages you will want to look for any login messages in the logs such as below which depending on your syslog can be searched:

Logging
0
 
LVL 1

Author Comment

by:RAMU CH
ID: 39814491
Is there any free syslog toools available in internet market..

How about Kiwi?


1.What should be the system details generally required to store Log data in a server?

2. What should be the configuration for only monitoring for Login and logout sessions instead every traffic to prevent  server gets  overloaded?


Regards
Ramu
0
 
LVL 8

Expert Comment

by:amatson78
ID: 39816421
I use Splunk which is a free SIEM product that accepts syslog. Easy to search through and make custom filters. As far as system specs depends on the product. Configuration is all done via the Cisco ASA, you can enable what features you want to log and what you don't.
0
 
LVL 1

Author Closing Comment

by:RAMU CH
ID: 39864510
Tks
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Sonicwall NSA 250 M SSL VPN very sloooow 2 55
Pfsense & Black list. 2 108
Palo Alto Networks Global Protect 2 105
Network Infrastructure for Branch Office 16 91
Optimal Xbox 360 connectivity requires "OPEN NAT". If you use Juniper Netscreen or SSG firewall products in a home setting, the following steps will allow you get rid of the dreaded warning screen below and achieve the best online gaming environment…
Imagine you have a shopping list of items you need to get at the grocery store. You have two options: A. Take one trip to the grocery store and get everything you need for the week, or B. Take multiple trips, buying an item at a time, to achieve t…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now