Chapter 13 Monitoring

Monitoring Live Event Log

Event Time

The time of the event: hour:minute:second.millisecond. The hour is based on

 

a 24-hour clock. For example, 14:37:06.680 identifies an event that occurred

 

at 2:37:06.680 PM.

Event Severity

The severity level of the event; for example: SEV=4 identifies an event of

 

severity level 4. See Table 9-4under Configuration System Events for an

 

explanation of severity levels.

Event Class/Number

The class—or source—of the event, and the internal reference number

 

associated with the specific event within the event class. For example:

 

HTTP/47 indicates that an administrator logged in to the VPN 3002 using

 

HTTP to connect to the Manager. Table 9-2under Configuration System

 

Events describes the event classes. The internal reference number assists

 

Cisco support personnel if they need to examine a log file.

Event Repeat

The number of times that this specific event has occurred since the VPN

 

3002 was last booted or reset. For example, RPT=17 indicates that this is the

 

seventeenth occurrence of this specific event.

Event IP address

The IP address of the client or host associated with this event. Only certain

 

events have this field. For tunnel-related events, this is typically the “outer”

 

or tunnel endpoint address. In the Event log format example above,

 

10.10.1.35 is the IP address of the host PC from which admin logged in using

 

the Manager.

Event String

The string, or message, that describes the specific event. Each event class

 

comprises many possible events, and the string gives a brief description.

 

Event strings usually do not exceed 80 characters. In the Event log format

 

example above, “New administrator login: admin” describes the event.

Monitoring Live Event Log

This screen shows events in the current event log and automatically updates the display every 5 seconds. The events might take a few seconds to load when you first open the screen.

Note for Netscape The live event log requires Netscape version 4.5 or higher. It does not run on other versions of Netscape.

users:

The screen always displays the most recent event at the bottom. Use the scroll bar to view earlier events. To filter and display events by various criteria, see the Monitoring Filterable Event Log section above.

Note If you keep this Manager screen open, your administrative session does not time out. Each automatic screen update resets the inactivity timer. See Session Idle Timeout on the Administration Access Rights Access Settings screen.

VPN 3002 Hardware Client Reference

13-6

OL-1893-01

 

 

 

Page 194
Image 194
Cisco Systems VPN 3002 manual Monitoring Live Event Log, 13-6

VPN 3002 specifications

Cisco Systems VPN 3002 is a versatile hardware device designed to provide secure remote access to corporate networks. As part of Cisco's family of VPN concentrators, the VPN 3002 is aimed at small to medium-sized businesses seeking to establish secure communications over the Internet.

One of the key features of the VPN 3002 is its ability to support a wide range of VPN protocols, including IPsec and L2TP. This flexibility allows businesses to tailor their security solutions to meet specific needs, thereby ensuring robust encryption and integrity for data in transit. The device also supports innovative technologies such as Clientless SSL VPN, enabling users to access corporate resources without the need for a full client installation.

Another vital characteristic of the VPN 3002 is its scalability. It can support multiple users while maintaining optimal performance due to its integrated firewall capabilities. This functionality allows organizations to manage user traffic effectively, ensuring that both security and efficiency are maintained during peak access periods.

Additionally, the VPN 3002 boasts advanced features like NAT traversal, which helps ensure that VPN connections can penetrate network address translation firewalls and other similar devices, thereby enhancing connectivity. It also features strong authentication mechanisms, including support for RADIUS and TACACS+, providing businesses with the ability to implement stringent user verification processes.

The device is designed with ease of use in mind. The setup process is relatively simple, and Cisco's intuitive web-based management interface makes it easy to configure and monitor VPN connections. Furthermore, the VPN 3002 comes with a variety of integrated tools for logging and reporting, allowing administrators to maintain comprehensive oversight of network activities.

In terms of hardware, the VPN 3002 is equipped with multiple Ethernet ports for network connectivity and can support a range of configurations to meet diverse organizational requirements. Its robust design ensures longevity and dependable operation, making it an ideal solution for businesses seeking reliable remote access capabilities.

In conclusion, Cisco Systems VPN 3002 provides a comprehensive solution for organizations looking to secure their remote connections. With its support for various protocols, scalable architecture, advanced security features, and ease of use, it stands out as a reliable choice for enhancing corporate network security.