<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco Auth Logging in Communications and Wireless</title>
    <link>https://community.hpe.com/t5/communications-and-wireless/cisco-auth-logging/m-p/3013550#M1478</link>
    <description>Thanks for your reply Ron.&lt;BR /&gt;&lt;BR /&gt;I already have a big access list set up to prevent access to the router from unknown sources.&lt;BR /&gt;&lt;BR /&gt;I want to be able to specifically log any auth attempts to the router itself.&lt;BR /&gt;&lt;BR /&gt;I guess this is more for audit reasons so that I can see who logged in, when.. The method of using the acl shows that some kind of traffic was either accepted or denied by my acl, I really need it to be auth specific??</description>
    <pubDate>Wed, 02 Jul 2003 14:31:34 GMT</pubDate>
    <dc:creator>adam_82</dc:creator>
    <dc:date>2003-07-02T14:31:34Z</dc:date>
    <item>
      <title>Cisco Auth Logging</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/cisco-auth-logging/m-p/3013548#M1476</link>
      <description>Hi, I have a cisco soho series router and I am logging events to a syslog server.. I am trying to log whenever someone logs into the router but not having much success..  Any ideas?</description>
      <pubDate>Wed, 02 Jul 2003 13:10:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/cisco-auth-logging/m-p/3013548#M1476</guid>
      <dc:creator>adam_82</dc:creator>
      <dc:date>2003-07-02T13:10:55Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Auth Logging</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/cisco-auth-logging/m-p/3013549#M1477</link>
      <description>Since you already have it talking to a syslog server (if not: &lt;A href="http://www.cisco.com/warp/customer/477/SNMP/snmp_traps.html#topic1)" target="_blank"&gt;http://www.cisco.com/warp/customer/477/SNMP/snmp_traps.html#topic1)&lt;/A&gt; and since there does not appear to be a trap for logins, I would try building a logging access list which would look for telnet traffic to the router and log it.  I have never worked with such a small router before so can't be sure it will take the usual IOS commands but try (assuming you do not have any access-lists already programmed.  If so use a different number in the 100-199 range):&lt;BR /&gt;&lt;BR /&gt;conf t&lt;BR /&gt;access-list 101 permit tcp any any log&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;(Then apply the access list to the vty interfaces.)&lt;BR /&gt;&lt;BR /&gt;line vty 0 4&lt;BR /&gt; access-class 101 in&lt;BR /&gt;end&lt;BR /&gt;wr me&lt;BR /&gt;&lt;BR /&gt;Note you can use this method to block access to all but a certain group of IP addresses if you want by changing the first "any" to "host a.b.c.d" and repeating the line for each host with ip address a.b.c.d which should be allowed to access the router or replacing the "any" with a network address and reverse mask ( class C example: a.b.c.0 0.0.0.255) which would restrict access to only hosts on the a.b.c.0 network.&lt;BR /&gt;&lt;BR /&gt;Ron&lt;BR /&gt;</description>
      <pubDate>Wed, 02 Jul 2003 14:16:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/cisco-auth-logging/m-p/3013549#M1477</guid>
      <dc:creator>Ron Kinner</dc:creator>
      <dc:date>2003-07-02T14:16:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Auth Logging</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/cisco-auth-logging/m-p/3013550#M1478</link>
      <description>Thanks for your reply Ron.&lt;BR /&gt;&lt;BR /&gt;I already have a big access list set up to prevent access to the router from unknown sources.&lt;BR /&gt;&lt;BR /&gt;I want to be able to specifically log any auth attempts to the router itself.&lt;BR /&gt;&lt;BR /&gt;I guess this is more for audit reasons so that I can see who logged in, when.. The method of using the acl shows that some kind of traffic was either accepted or denied by my acl, I really need it to be auth specific??</description>
      <pubDate>Wed, 02 Jul 2003 14:31:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/cisco-auth-logging/m-p/3013550#M1478</guid>
      <dc:creator>adam_82</dc:creator>
      <dc:date>2003-07-02T14:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco Auth Logging</title>
      <link>https://community.hpe.com/t5/communications-and-wireless/cisco-auth-logging/m-p/3013551#M1479</link>
      <description>Make a separate access list using a different number just for the virtual terminals and if the log file doesn't tell you what IP address tried to do it then you can expand the access list by making it look for a particular IP address.  Since the access list is only used by the terminals then any indication would indicate an attempt and should tell you when and what IP tried to get in.&lt;BR /&gt;&lt;BR /&gt;You can also set it up to use an external database for authentification tho you would have to have a server running radius (&lt;A href="http://www.freeradius.org/)" target="_blank"&gt;http://www.freeradius.org/)&lt;/A&gt; or tacacs+ (&lt;A href="http://www.gazi.edu.tr/tacacs/)" target="_blank"&gt;http://www.gazi.edu.tr/tacacs/)&lt;/A&gt;&lt;BR /&gt; &lt;BR /&gt;Cisco set up:  &lt;A href="http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/products_command_reference_book09186a00800ca4ad.html" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/iosswrel/ps1828/products_command_reference_book09186a00800ca4ad.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Finally if you don't mind a lot of garbage in your syslog you can turn on aaa authentification and then turn on debug aaa auth.  &lt;BR /&gt;&lt;BR /&gt;conf t&lt;BR /&gt;aaa new-model&lt;BR /&gt;aaa authentication login default local   &lt;BR /&gt;user YOU password YOURPASSWORD&lt;BR /&gt;cons logg deb&lt;BR /&gt;logg buff&lt;BR /&gt;logg trap deb&lt;BR /&gt;end&lt;BR /&gt;debug aaa auth&lt;BR /&gt;&lt;BR /&gt;You may not need the "cons logg deb" command but it doesn't seem to work on 11.0 without it and that's all we have in the lab to play with.  You will now have to login with a username and password and you should get something like this each time:&lt;BR /&gt;&lt;BR /&gt;AAA/AUTHEN: free user='you' ruser='' port='tty3' rem_addr='172.16.4.71' authen_t&lt;BR /&gt;ype=1 service=1 priv=1&lt;BR /&gt;AAA/AUTHEN: create_user user='' ruser='' port='tty3' rem_addr='172.16.4.71' auth&lt;BR /&gt;en_type=1 service=1 priv=1&lt;BR /&gt;AAA/AUTHEN/START (0): port='tty3' list='' action=LOGIN service=LOGIN&lt;BR /&gt;AAA/AUTHEN/START (0): using "default" list&lt;BR /&gt;AAA/AUTHEN/START (67502978): Method=LOCAL&lt;BR /&gt;AAA/AUTHEN (67502978): status = GETUSER&lt;BR /&gt;AAA/AUTHEN/CONT (67502978): continue_login&lt;BR /&gt;AAA/AUTHEN (67502978): status = GETUSER&lt;BR /&gt;AAA/AUTHEN/CONT (67502978): Method=LOCAL&lt;BR /&gt;AAA/AUTHEN (67502978): status = GETPASS&lt;BR /&gt;AAA/AUTHEN/CONT (67502978): continue_login&lt;BR /&gt;AAA/AUTHEN (67502978): status = GETPASS&lt;BR /&gt;AAA/AUTHEN/CONT (67502978): Method=LOCAL&lt;BR /&gt;AAA/AUTHEN (67502978): status = PASS &lt;BR /&gt;&lt;BR /&gt;It shows up in Sh log so I suppose it would also get sent to your syslog.  If you decide to try this, test it with a second telnet session before saving the config or logging off.  That way if you mess it up and it won't let you in then you can fix it with the first session and you won't be locked out.&lt;BR /&gt;&lt;BR /&gt;Ron&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 02 Jul 2003 19:51:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/communications-and-wireless/cisco-auth-logging/m-p/3013551#M1479</guid>
      <dc:creator>Ron Kinner</dc:creator>
      <dc:date>2003-07-02T19:51:05Z</dc:date>
    </item>
  </channel>
</rss>

