<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Monitoring ASA IPSec using SNMP in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4424346#M1081809</link>
    <description>&lt;P&gt;what is the version of ASA code for both working and not working. Not that i am ware using SNMP you can monitor Multiple tunnels&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Instead, why not set up SNMP traps to Syslog and generate events or alerts&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or use out of the box any script login to ASA get VPN details and report or generate alert ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 27 Jun 2021 01:57:16 GMT</pubDate>
    <dc:creator>balaji.bandi</dc:creator>
    <dc:date>2021-06-27T01:57:16Z</dc:date>
    <item>
      <title>Monitoring ASA IPSec using SNMP</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4424341#M1081805</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have ASA 5515 configured with multiple VPNs I want to monitor these VPNs using ZABBIX&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used the SNMPwalk command as shown,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;snmpwalk -v3 -l authPriv -u USER -a SHA -A "XXXXXXXXX" -x AES -X "XXXXXXXX" 192.168.15.12 CISCO-IPSEC-FLOW-MONITOR-MIB::cikeTunLocalValue&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the ASA returns with&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CISCO-IPSEC-FLOW-MONITOR-MIB::cikeTunLocalValue = No Such Instance currently exists at this OID&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;while when I tried the same command to another ASA 5515 it works properly&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I checked all the SNMP configuration it looks ok&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;is there any idea about this, please?&lt;/P&gt;</description>
      <pubDate>Sun, 27 Jun 2021 00:51:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4424341#M1081805</guid>
      <dc:creator>Qays</dc:creator>
      <dc:date>2021-06-27T00:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring ASA IPSec using SNMP</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4424346#M1081809</link>
      <description>&lt;P&gt;what is the version of ASA code for both working and not working. Not that i am ware using SNMP you can monitor Multiple tunnels&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Instead, why not set up SNMP traps to Syslog and generate events or alerts&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;or use out of the box any script login to ASA get VPN details and report or generate alert ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Jun 2021 01:57:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4424346#M1081809</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-06-27T01:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring ASA IPSec using SNMP</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4424527#M1081819</link>
      <description>&lt;P&gt;SNMP MIB support varies across ASA versions and is not well-documented. Give this command a try to check your ASA:&lt;/P&gt;
&lt;PRE&gt;show snmp-server oidlist | i 1.3.6.1.4.1.9.9.392.1.3&lt;/PRE&gt;
&lt;P&gt;Also see my article relating similar experiences with SSL VPN sessions:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.cisco.com/t5/security-documents/prtg-vs-asa/ta-p/4083428" target="_blank" rel="noopener"&gt;https://community.cisco.com/t5/security-documents/prtg-vs-asa/ta-p/4083428&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 01:47:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4424527#M1081819</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-06-28T01:47:35Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring ASA IPSec using SNMP</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4425375#M1081871</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;balaji.bandi&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I will try SNMP Traps thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 11:52:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4425375#M1081871</guid>
      <dc:creator>Qays</dc:creator>
      <dc:date>2021-06-29T11:52:55Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring ASA IPSec using SNMP</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4425377#M1081872</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;Marvin Rhoads&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;this the output&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;ASA15# show snmp-server oidlist | i 1.3.6.1.4.1.9.9.392.1.3&lt;/STRONG&gt;&lt;BR /&gt;[681] 1.3.6.1.4.1.9.9.392.1.3.1. crasNumSessions&lt;BR /&gt;[682] 1.3.6.1.4.1.9.9.392.1.3.2. crasNumPrevSessions&lt;BR /&gt;[683] 1.3.6.1.4.1.9.9.392.1.3.3. crasNumUsers&lt;BR /&gt;[684] 1.3.6.1.4.1.9.9.392.1.3.4. crasNumGroups&lt;BR /&gt;[685] 1.3.6.1.4.1.9.9.392.1.3.5. crasGlobalInPkts&lt;BR /&gt;[686] 1.3.6.1.4.1.9.9.392.1.3.6. crasGlobalOutPkts&lt;BR /&gt;[687] 1.3.6.1.4.1.9.9.392.1.3.7. crasGlobalInOctets&lt;BR /&gt;[688] 1.3.6.1.4.1.9.9.392.1.3.8. crasGlobalInDecompOctets&lt;BR /&gt;[689] 1.3.6.1.4.1.9.9.392.1.3.9. crasGlobalOutOctets&lt;BR /&gt;[690] 1.3.6.1.4.1.9.9.392.1.3.10. crasGlobalOutUncompOctets&lt;BR /&gt;[691] 1.3.6.1.4.1.9.9.392.1.3.11. crasGlobalInDropPkts&lt;BR /&gt;[692] 1.3.6.1.4.1.9.9.392.1.3.12. crasGlobalOutDropPkts&lt;BR /&gt;[693] 1.3.6.1.4.1.9.9.392.1.3.21.1.2. crasGroup&lt;BR /&gt;[694] 1.3.6.1.4.1.9.9.392.1.3.21.1.4. crasAuthenMethod&lt;BR /&gt;[695] 1.3.6.1.4.1.9.9.392.1.3.21.1.5. crasAuthorMethod&lt;BR /&gt;[696] 1.3.6.1.4.1.9.9.392.1.3.21.1.6. crasSessionDuration&lt;BR /&gt;[697] 1.3.6.1.4.1.9.9.392.1.3.21.1.7. crasLocalAddressType&lt;BR /&gt;[698] 1.3.6.1.4.1.9.9.392.1.3.21.1.8. crasLocalAddress&lt;BR /&gt;[699] 1.3.6.1.4.1.9.9.392.1.3.21.1.9. crasISPAddressType&lt;BR /&gt;[700] 1.3.6.1.4.1.9.9.392.1.3.21.1.10. crasISPAddress&lt;BR /&gt;[701] 1.3.6.1.4.1.9.9.392.1.3.21.1.11. crasSessionProtocol&lt;BR /&gt;[702] 1.3.6.1.4.1.9.9.392.1.3.21.1.12. crasProtocolElement&lt;BR /&gt;[703] 1.3.6.1.4.1.9.9.392.1.3.21.1.13. crasSessionEncryptionAlgo&lt;BR /&gt;[704] 1.3.6.1.4.1.9.9.392.1.3.21.1.14. crasSessionPktAuthenAlgo&lt;BR /&gt;[705] 1.3.6.1.4.1.9.9.392.1.3.21.1.15. crasSessionCompressionAlgo&lt;BR /&gt;[706] 1.3.6.1.4.1.9.9.392.1.3.21.1.16. crasHeartbeatInterval&lt;BR /&gt;[707] 1.3.6.1.4.1.9.9.392.1.3.21.1.17. crasClientVendorString&lt;BR /&gt;[708] 1.3.6.1.4.1.9.9.392.1.3.21.1.18. crasClientVersionString&lt;BR /&gt;[709] 1.3.6.1.4.1.9.9.392.1.3.21.1.19. crasClientOSVendorString&lt;BR /&gt;[710] 1.3.6.1.4.1.9.9.392.1.3.21.1.20. crasClientOSVersionString&lt;BR /&gt;[711] 1.3.6.1.4.1.9.9.392.1.3.21.1.21. crasPrimWINSServerAddrType&lt;BR /&gt;[712] 1.3.6.1.4.1.9.9.392.1.3.21.1.22. crasPrimWINSServer&lt;BR /&gt;[713] 1.3.6.1.4.1.9.9.392.1.3.21.1.23. crasSecWINSServerAddrType&lt;BR /&gt;[714] 1.3.6.1.4.1.9.9.392.1.3.21.1.24. crasSecWINSServer&lt;BR /&gt;[715] 1.3.6.1.4.1.9.9.392.1.3.21.1.25. crasPrimDNSServerAddrType&lt;BR /&gt;[716] 1.3.6.1.4.1.9.9.392.1.3.21.1.26. crasPrimDNSServer&lt;BR /&gt;[717] 1.3.6.1.4.1.9.9.392.1.3.21.1.27. crasSecDNSServerAddrType&lt;BR /&gt;[718] 1.3.6.1.4.1.9.9.392.1.3.21.1.28. crasSecDNSServer&lt;BR /&gt;[719] 1.3.6.1.4.1.9.9.392.1.3.21.1.29. crasDHCPServerAddrType&lt;BR /&gt;[720] 1.3.6.1.4.1.9.9.392.1.3.21.1.30. crasDHCPServer&lt;BR /&gt;[721] 1.3.6.1.4.1.9.9.392.1.3.21.1.31. crasSessionInPkts&lt;BR /&gt;[722] 1.3.6.1.4.1.9.9.392.1.3.21.1.32. crasSessionOutPkts&lt;BR /&gt;[723] 1.3.6.1.4.1.9.9.392.1.3.21.1.33. crasSessionInDropPkts&lt;BR /&gt;[724] 1.3.6.1.4.1.9.9.392.1.3.21.1.34. crasSessionOutDropPkts&lt;BR /&gt;[725] 1.3.6.1.4.1.9.9.392.1.3.21.1.35. crasSessionInOctets&lt;BR /&gt;[726] 1.3.6.1.4.1.9.9.392.1.3.21.1.36. crasSessionOutOctets&lt;BR /&gt;[727] 1.3.6.1.4.1.9.9.392.1.3.21.1.37. crasSessionState&lt;BR /&gt;[728] 1.3.6.1.4.1.9.9.392.1.3.22.1.2. crasActGrNumUsers&lt;BR /&gt;[729] 1.3.6.1.4.1.9.9.392.1.3.22.1.3. crasActGrpInPkts&lt;BR /&gt;[730] 1.3.6.1.4.1.9.9.392.1.3.22.1.4. crasActGrpOutPkts&lt;BR /&gt;[731] 1.3.6.1.4.1.9.9.392.1.3.22.1.5. crasActGrpInDropPkts&lt;BR /&gt;[732] 1.3.6.1.4.1.9.9.392.1.3.22.1.6. crasActGrpOutDropPkts&lt;BR /&gt;[733] 1.3.6.1.4.1.9.9.392.1.3.22.1.7. crasActGrpInOctets&lt;BR /&gt;[734] 1.3.6.1.4.1.9.9.392.1.3.22.1.8. crasActGrpOutOctets&lt;BR /&gt;[735] 1.3.6.1.4.1.9.9.392.1.3.26. crasIPSecNumSessions&lt;BR /&gt;[736] 1.3.6.1.4.1.9.9.392.1.3.27. crasIPSecCumulateSessions&lt;BR /&gt;[737] 1.3.6.1.4.1.9.9.392.1.3.28. crasIPSecPeakConcurrentSessions&lt;BR /&gt;[738] 1.3.6.1.4.1.9.9.392.1.3.29. crasL2LNumSessions&lt;BR /&gt;[739] 1.3.6.1.4.1.9.9.392.1.3.30. crasL2LCumulateSessions&lt;BR /&gt;[740] 1.3.6.1.4.1.9.9.392.1.3.31. crasL2LPeakConcurrentSessions&lt;BR /&gt;[741] 1.3.6.1.4.1.9.9.392.1.3.32. crasLBNumSessions&lt;BR /&gt;[742] 1.3.6.1.4.1.9.9.392.1.3.33. crasLBCumulateSessions&lt;BR /&gt;[743] 1.3.6.1.4.1.9.9.392.1.3.34. crasLBPeakConcurrentSessions&lt;BR /&gt;[744] 1.3.6.1.4.1.9.9.392.1.3.35. crasSVCNumSessions&lt;BR /&gt;[745] 1.3.6.1.4.1.9.9.392.1.3.36. crasSVCCumulateSessions&lt;BR /&gt;[746] 1.3.6.1.4.1.9.9.392.1.3.37. crasSVCPeakConcurrentSessions&lt;BR /&gt;[747] 1.3.6.1.4.1.9.9.392.1.3.38. crasWebvpnNumSessions&lt;BR /&gt;[748] 1.3.6.1.4.1.9.9.392.1.3.39. crasWebvpnCumulateSessions&lt;BR /&gt;[749] 1.3.6.1.4.1.9.9.392.1.3.40. crasWebvpnPeakConcurrentSessions&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 11:54:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4425377#M1081872</guid>
      <dc:creator>Qays</dc:creator>
      <dc:date>2021-06-29T11:54:53Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring ASA IPSec using SNMP</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4426046#M1081900</link>
      <description>&lt;P&gt;So we can see in that output a plethora of available metrics that can be polled for VPN information. Do those not suffice?&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jun 2021 12:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4426046#M1081900</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-06-30T12:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring ASA IPSec using SNMP</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4427712#M1081973</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;Marvin Rhoads&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Firstly thanks for your response&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;as clarification, I want to make alarms for specific connections&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I tried to use&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;snmpwalk -v3 -Ir -l authPriv -u USER -a SHA -A "XXXXXXX" -x AES -X "XXXXXXXX" 10.10.10.10 CISCO-REMOTE-ACCESS-MONITOR-MIB::crasSessionState&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;it gives me all current up sessions but I couldn't check the status for a specific VPN &amp;nbsp;Like&amp;nbsp; what I used with other ASA that support&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CISCO-IPSEC-FLOW-MONITOR-MIB::cikeTunStatus&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;when I add the&amp;nbsp;session ID&amp;nbsp; as&amp;nbsp; Shown&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;snmpwalk -v3 -Ir -l authPriv -u USER -a SHA -A "XXXXXXX" -x AES -X "XXXXXXXX" 11.111.11.1 CISCO-IPSEC-FLOW-MONITOR-MIB::cikeTunStatus.9&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;it gives me the status for that tunnel (9) only.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For this ASA I tried all of&amp;nbsp;&lt;STRONG&gt;CISCO-REMOTE-ACCESS-MONITOR-MIB &lt;/STRONG&gt;the most suitable one is&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;CISCO-REMOTE-ACCESS-MONITOR-MIB::crasSessionState&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;I tried&amp;nbsp; to add the ID with MIB&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;snmpwalk -v3 -Ir -l authPriv -u USER -a SHA -A "XXXXXXX" -x AES -X "XXXXXXXX" 10.10.10.10 CISCO-REMOTE-ACCESS-MONITOR-MIB::crasSessionState.202657795&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;the response comes with:&lt;STRONG&gt;&lt;BR /&gt;CISCO-REMOTE-ACCESS-MONITOR-MIB::crasSessionState.202657795: Unknown Object Identifier (Index out of range: 202657795 (crasUsername))&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;is there any advice for this?&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Thanks&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jul 2021 12:28:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4427712#M1081973</guid>
      <dc:creator>Qays</dc:creator>
      <dc:date>2021-07-04T12:28:13Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring ASA IPSec using SNMP</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4427863#M1081975</link>
      <description>&lt;P&gt;I checked one of my SolarWinds installations that's monitoring an ASA with remote access VPN. It appears to be getting the remote address of IPsec site-to-site VPNs by polling the following:&lt;/P&gt;
&lt;PRE&gt;crasISPAddress
1.3.6.1.4.1.9.9.392.1.3.21.1.10&lt;/PRE&gt;
&lt;P&gt;I'm not positive how it is correlating that with the statistics it also reports for the same sessions as there doesn't appear to be an index value in that overall MIB section. The ASA is this case is running 9.12(4)18.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 02:17:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4427863#M1081975</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2021-07-05T02:17:47Z</dc:date>
    </item>
    <item>
      <title>Re: Monitoring ASA IPSec using SNMP</title>
      <link>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4427977#M1081980</link>
      <description>&lt;P&gt;I think the way that I want to use couldn't work with my ASA, ASA version&amp;nbsp;9.12(4)24&lt;/P&gt;&lt;P&gt;Thanks,&amp;nbsp;&lt;SPAN&gt;Marvin&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 09:25:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/monitoring-asa-ipsec-using-snmp/m-p/4427977#M1081980</guid>
      <dc:creator>Qays</dc:creator>
      <dc:date>2021-07-05T09:25:49Z</dc:date>
    </item>
  </channel>
</rss>

