Chapter 13 Monitoring

Monitoring Filterable Event Log

Get Log

To download the event log from VPN 3002 memory to your PC and view it

 

or save it as a text file, click Get Log. The Manager opens a new browser

 

window to display the file. The browser address bar shows the VPN 3002

 

address and log file default filename; for example,

 

http://10.10.4.6/LOG/vpn3002log.txt.

 

To save a copy of the log file on your PC, click the File menu on the new

 

browser window and select Save As.... The browser opens a dialog box that

 

lets you save the file. The default filename is vpn3002log.txt.

 

Alternatively, you can use the secondary mouse button to click Get Log on

 

this Monitoring Filterable Event Log screen. A pop-up menu presents

 

choices whose exact wording depends on your browser, but among them are:

 

Open Link, Open Link in New Window, Open in New Window =

 

Open and view the file in a new browser window, as above.

 

Save Target As..., Save Link As... = Save a copy of the log file on your

 

PC. Your system will prompt for a filename and location. The default

 

filename is vpn3002log.txt.

 

When you are finished viewing or saving the file, close the new browser

 

window.

Clear Log

To clear the current event log from memory, click this button. The Manager

 

then refreshes the screen and shows the empty log.

 

 

 

 

 

 

 

Caution The Manager immediately erases the event log

 

 

 

 

from memory without asking for confirmation.

 

 

 

 

There is no undo.

 

 

 

 

 

Event Log Format

Each entry (record) in the event log consists of eight or nine fields:

Sequence Date Time Severity Class/Number Repeat (IPAddress)

String

(The IPAddress field only appears in certain events.)

For example:

3 12/06/2001 14:37:06.680 SEV=4 HTTP/47 RPT=17 10.10.1.35

New administrator login: admin.

 

Event Sequence

The sequential number of the logged entry. Numbering starts or restarts from

 

 

1 when the system powers up, when you save the event log, or when you

 

 

clear the event log. When the log file wraps after 256 entries, numbering

 

 

continues with event 257 overwriting event 1.

 

 

Although numbering restarts at 1 when the system powers up, it does not

 

 

overwrite existing entries in the event log; it appends them. Assuming the

 

 

log does not wrap, it could contain several sequences of events starting at 1.

 

 

Thus you can examine events preceding and following reboot or reset cycles.

 

Event Date

The date of the event: MM/DD/YYYY. For example, 12/06/2001 identifies

 

 

an event that occurred on December 6, 2001.

 

 

VPN 3002 Hardware Client Reference

 

 

 

 

 

 

 

OL-1893-01

 

 

13-5

 

 

 

 

 

Page 193
Image 193
Cisco Systems VPN 3002 manual Event Log Format, 13-5

VPN 3002 specifications

Cisco Systems VPN 3002 is a versatile hardware device designed to provide secure remote access to corporate networks. As part of Cisco's family of VPN concentrators, the VPN 3002 is aimed at small to medium-sized businesses seeking to establish secure communications over the Internet.

One of the key features of the VPN 3002 is its ability to support a wide range of VPN protocols, including IPsec and L2TP. This flexibility allows businesses to tailor their security solutions to meet specific needs, thereby ensuring robust encryption and integrity for data in transit. The device also supports innovative technologies such as Clientless SSL VPN, enabling users to access corporate resources without the need for a full client installation.

Another vital characteristic of the VPN 3002 is its scalability. It can support multiple users while maintaining optimal performance due to its integrated firewall capabilities. This functionality allows organizations to manage user traffic effectively, ensuring that both security and efficiency are maintained during peak access periods.

Additionally, the VPN 3002 boasts advanced features like NAT traversal, which helps ensure that VPN connections can penetrate network address translation firewalls and other similar devices, thereby enhancing connectivity. It also features strong authentication mechanisms, including support for RADIUS and TACACS+, providing businesses with the ability to implement stringent user verification processes.

The device is designed with ease of use in mind. The setup process is relatively simple, and Cisco's intuitive web-based management interface makes it easy to configure and monitor VPN connections. Furthermore, the VPN 3002 comes with a variety of integrated tools for logging and reporting, allowing administrators to maintain comprehensive oversight of network activities.

In terms of hardware, the VPN 3002 is equipped with multiple Ethernet ports for network connectivity and can support a range of configurations to meet diverse organizational requirements. Its robust design ensures longevity and dependable operation, making it an ideal solution for businesses seeking reliable remote access capabilities.

In conclusion, Cisco Systems VPN 3002 provides a comprehensive solution for organizations looking to secure their remote connections. With its support for various protocols, scalable architecture, advanced security features, and ease of use, it stands out as a reliable choice for enhancing corporate network security.