<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AnyConnect VPN Client FAQ in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3187129#M1065961</link>
    <description>Hi John,&lt;BR /&gt;I know about this command, what i want is to get what they are doing after VPN connection, like for ex. if they are SSH-ing or RDP-ing to any server or devices.&lt;BR /&gt;Thanks</description>
    <pubDate>Thu, 21 Sep 2017 07:10:07 GMT</pubDate>
    <dc:creator>ashleybabajee</dc:creator>
    <dc:date>2017-09-21T07:10:07Z</dc:date>
    <item>
      <title>AnyConnect VPN Client FAQ</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3186540#M1065947</link>
      <description>&lt;P&gt;Hi ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i want to know/monitor what the users did or accessed once they have log in via VPN using Cisco ASA.&lt;/P&gt;&lt;P&gt;Want to get the login/logout , durantion, what they accessed for ex. RDP or any services.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 14:20:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3186540#M1065947</guid>
      <dc:creator>ashleybabajee</dc:creator>
      <dc:date>2020-02-21T14:20:08Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN Client FAQ</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3186633#M1065950</link>
      <description>&lt;P&gt;SSL VPN login and logout creates a syslog entry. You can parse those in an external syslog tool to get the first bits you are asking about.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Exactly what was accessed requires analysis of the individual tcp connections or udp flows. While you can do it with ASA informational syslogs (level 6), they are all mixed in with every other flow through the firewall and it can be difficult to separate the VPN users from everything else the ASA generates.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2017 10:46:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3186633#M1065950</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-09-20T10:46:50Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN Client FAQ</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3186654#M1065953</link>
      <description>&lt;P&gt;Thanks Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there any third party hardware/software capable of doing that ?&lt;/P&gt;&lt;P&gt;we need to know what our administrators are doing when connected through VPN, like for ex. to which IP addres they are connected and which protocol like SSH, RDP or others.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly advise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2017 11:13:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3186654#M1065953</guid>
      <dc:creator>ashleybabajee</dc:creator>
      <dc:date>2017-09-20T11:13:53Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN Client FAQ</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3186662#M1065956</link>
      <description>&lt;P&gt;You can extract the information in one of two ways:&lt;/P&gt;
&lt;P&gt;1. syslog level 6 messages as noted earlier. Those would go to a 3rd party syslog tool like Splunk, Kiwi syslog analyzer etc.&lt;/P&gt;
&lt;P&gt;2. Netflow records to a netflow analyzer like Cisco Stealthwatch or 3rd party tool like Solarwinds Netflow Traffic Analyzer.&lt;/P&gt;
&lt;P&gt;Generallly speaking, the more you pay for those external tools the more capability they will have for parsing and visualizing the information. At the high end they can become quite expensive (US$10,000 to over $100,000). Basic syslog is free but you will just have a flat text file of what address connected to which other adress using what tcp or udp port. It is then up to you to make sense of that.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Sep 2017 11:23:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3186662#M1065956</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-09-20T11:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN Client FAQ</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3187109#M1065958</link>
      <description>Thanks Marvin,&lt;BR /&gt;Heard about Splunk, will check Stealth watch also.</description>
      <pubDate>Thu, 21 Sep 2017 06:29:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3187109#M1065958</guid>
      <dc:creator>ashleybabajee</dc:creator>
      <dc:date>2017-09-21T06:29:54Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN Client FAQ</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3187124#M1065960</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;you can use &lt;STRONG&gt;show&amp;nbsp;vpn-sessiondb anyconnect&lt;/STRONG&gt; to know the user's source public IP, protocol, encryption and hashing protocols, etc. see example below.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;# show vpn-sessiondb anyconnect&lt;/P&gt;&lt;P&gt;Session Type: AnyConnect&lt;/P&gt;&lt;P&gt;Username : admin Index : 39926&lt;BR /&gt;Assigned IP : 172.1.1.1 Public IP : 162.1.1.1&lt;BR /&gt;Protocol : AnyConnect-Parent SSL-Tunnel DTLS-Tunnel&lt;BR /&gt;License : AnyConnect Essentials&lt;BR /&gt;Encryption : AnyConnect-Parent: (1)none SSL-Tunnel: (1)AES128 DTLS-Tunnel: (1)AES128&lt;BR /&gt;Hashing : AnyConnect-Parent: (1)none SSL-Tunnel: (1)SHA1 DTLS-Tunnel: (1)SHA1&lt;BR /&gt;Bytes Tx : 1241441645 Bytes Rx : 635943314&lt;BR /&gt;Group Policy : GP-VPN Tunnel Group : GP-VPN&lt;BR /&gt;Login Time : 09:03:53 CDT Sun Sep 17 2017&lt;BR /&gt;Duration : 3d 16h:52m:40s&lt;BR /&gt;Inactivity : 0h:00m:00s&lt;BR /&gt;NAC Result : Unknown&lt;BR /&gt;VLAN Mapping : N/A VLAN : none&lt;/P&gt;</description>
      <pubDate>Thu, 21 Sep 2017 07:01:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3187124#M1065960</guid>
      <dc:creator>johnlloyd_13</dc:creator>
      <dc:date>2017-09-21T07:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: AnyConnect VPN Client FAQ</title>
      <link>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3187129#M1065961</link>
      <description>Hi John,&lt;BR /&gt;I know about this command, what i want is to get what they are doing after VPN connection, like for ex. if they are SSH-ing or RDP-ing to any server or devices.&lt;BR /&gt;Thanks</description>
      <pubDate>Thu, 21 Sep 2017 07:10:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/anyconnect-vpn-client-faq/m-p/3187129#M1065961</guid>
      <dc:creator>ashleybabajee</dc:creator>
      <dc:date>2017-09-21T07:10:07Z</dc:date>
    </item>
  </channel>
</rss>

