Chapter 9

Events

Configuration System Events General

Syslog Format

Click the Syslog Format drop-down menu button and choose the format for all events sent to UNIX syslog servers. Choices are:

Original = Original VPN 3002 event format with information on one line. Each entry in the event log consists of the following fields:

Sequence Date Time SEV=Severity Class/Number RPT=RepeatCount String

Sequence: The sequence number of the event.

Date: The date the event occurred. The date is in the following format: MM/DD/YYYY.

Time: The time the event occurred. The time is in the following format: hh:mm:ss.ttt.

Severity: The severity of the event (1-13). To see how this original severity level maps to Cisco IOS severity levels, see Table 9-2.

Class/Number: The event class and event number. For a list of event classes, see the “Events” chapter.

RepeatCount: The number of times this particular event has occurred since the VPN 3002 was last booted.

String: The description of the event. The string sometimes includes the IP address of the user whose session generated the event.

For example:

3 12/06/1999 14:37:06.680 SEV=4 HTTP/47 RPT=17 10.10.1.35 New administrator login:

admin.

Cisco IOS Compatible = Event format that is compatible with Cisco syslog management applications. Each entry in the event log is one line consisting of the following fields:

Sequence: Date Time TimeZone TimeZoneOffset %Class-Severity-Number: RPT=RepeatCount:

String

Sequence: The sequence number of the event.

Date: The date the event occurred. The date is in the following format: YYYY MMM DD.

Time: The time the event occurred. The time is in the following format: hh:mm:ss.ttt.

TimeZone: The time zone in which the event occurred.

TimeZoneOffset: The offset of the time zone from GMT.

Class: The event class. For a list of event classes, see the “Events” chapter.

Severity: The Cisco IOS severity of the event (0-7). Table 9-3shows the mapping between Cisco IOS format severity levels and Original format severity levels.

Number: The event number.

RepeatCount: The number of times this particular event has occurred since the VPN Concentrator was last booted.

String: The description of the event. The string sometimes includes the IP address of the user whose session generated the event.

For example:

31999 Dec 06 14:37:06.680 EDT -4:00 %HTTP-5-47:RPT=17 10.10.1.35: New administrator login: admin.

VPN 3002 Hardware Client Reference

9-6

OL-1893-01

 

 

 

Page 102
Image 102
Cisco Systems VPN 3002 manual Syslog Format

VPN 3002 specifications

Cisco Systems VPN 3002 is a versatile hardware device designed to provide secure remote access to corporate networks. As part of Cisco's family of VPN concentrators, the VPN 3002 is aimed at small to medium-sized businesses seeking to establish secure communications over the Internet.

One of the key features of the VPN 3002 is its ability to support a wide range of VPN protocols, including IPsec and L2TP. This flexibility allows businesses to tailor their security solutions to meet specific needs, thereby ensuring robust encryption and integrity for data in transit. The device also supports innovative technologies such as Clientless SSL VPN, enabling users to access corporate resources without the need for a full client installation.

Another vital characteristic of the VPN 3002 is its scalability. It can support multiple users while maintaining optimal performance due to its integrated firewall capabilities. This functionality allows organizations to manage user traffic effectively, ensuring that both security and efficiency are maintained during peak access periods.

Additionally, the VPN 3002 boasts advanced features like NAT traversal, which helps ensure that VPN connections can penetrate network address translation firewalls and other similar devices, thereby enhancing connectivity. It also features strong authentication mechanisms, including support for RADIUS and TACACS+, providing businesses with the ability to implement stringent user verification processes.

The device is designed with ease of use in mind. The setup process is relatively simple, and Cisco's intuitive web-based management interface makes it easy to configure and monitor VPN connections. Furthermore, the VPN 3002 comes with a variety of integrated tools for logging and reporting, allowing administrators to maintain comprehensive oversight of network activities.

In terms of hardware, the VPN 3002 is equipped with multiple Ethernet ports for network connectivity and can support a range of configurations to meet diverse organizational requirements. Its robust design ensures longevity and dependable operation, making it an ideal solution for businesses seeking reliable remote access capabilities.

In conclusion, Cisco Systems VPN 3002 provides a comprehensive solution for organizations looking to secure their remote connections. With its support for various protocols, scalable architecture, advanced security features, and ease of use, it stands out as a reliable choice for enhancing corporate network security.