<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco FTD - AAA (Accounting only) to extenral radius server in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ftd-aaa-accounting-only-to-extenral-radius-server/m-p/4834084#M1100364</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Recently, I am trying to migrate AAA accounting setting of cisco firewall from ASA to FTD. In old ASA, I have some commands like.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa accounting command PRIVILEGE 15 RADIUS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa accounting ssh console&amp;nbsp;RADIUS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa accounting serial console&amp;nbsp;RADIUS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa accounting enable console&amp;nbsp;RADIUS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;However it seems that the CLI is something different in FTD platform?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also checked the managment access page to setup.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="a1181231_0-1683874617084.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/184471i38D360945ED55D68/image-size/medium?v=v2&amp;amp;px=400" role="button" title="a1181231_0-1683874617084.png" alt="a1181231_0-1683874617084.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="a1181231_1-1683874691147.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/184472i66646DDA671EA89B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="a1181231_1-1683874691147.png" alt="a1181231_1-1683874691147.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The radius server setting only allow authenication and authorization, but no accounting? I mean, if I login by cisco local account, how can I see login log from external server?&lt;/P&gt;&lt;P&gt;I see that the device login/logout log stored locally is what I needed, but there is no button to export it to external radius.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DeviceAdministrationSummary.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/184524i429BE7E9E7F81A95/image-size/large?v=v2&amp;amp;px=999" role="button" title="DeviceAdministrationSummary.PNG" alt="DeviceAdministrationSummary.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Or I should use syslog instead to radius accounting to monitor administrative action?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 12 May 2023 12:05:35 GMT</pubDate>
    <dc:creator>a1181231</dc:creator>
    <dc:date>2023-05-12T12:05:35Z</dc:date>
    <item>
      <title>Cisco FTD - AAA (Accounting only) to extenral radius server</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-aaa-accounting-only-to-extenral-radius-server/m-p/4834084#M1100364</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Recently, I am trying to migrate AAA accounting setting of cisco firewall from ASA to FTD. In old ASA, I have some commands like.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa accounting command PRIVILEGE 15 RADIUS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa accounting ssh console&amp;nbsp;RADIUS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa accounting serial console&amp;nbsp;RADIUS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;aaa accounting enable console&amp;nbsp;RADIUS&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;However it seems that the CLI is something different in FTD platform?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also checked the managment access page to setup.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="a1181231_0-1683874617084.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/184471i38D360945ED55D68/image-size/medium?v=v2&amp;amp;px=400" role="button" title="a1181231_0-1683874617084.png" alt="a1181231_0-1683874617084.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="a1181231_1-1683874691147.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/184472i66646DDA671EA89B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="a1181231_1-1683874691147.png" alt="a1181231_1-1683874691147.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The radius server setting only allow authenication and authorization, but no accounting? I mean, if I login by cisco local account, how can I see login log from external server?&lt;/P&gt;&lt;P&gt;I see that the device login/logout log stored locally is what I needed, but there is no button to export it to external radius.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="DeviceAdministrationSummary.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/184524i429BE7E9E7F81A95/image-size/large?v=v2&amp;amp;px=999" role="button" title="DeviceAdministrationSummary.PNG" alt="DeviceAdministrationSummary.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Or I should use syslog instead to radius accounting to monitor administrative action?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 May 2023 12:05:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-aaa-accounting-only-to-extenral-radius-server/m-p/4834084#M1100364</guid>
      <dc:creator>a1181231</dc:creator>
      <dc:date>2023-05-12T12:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FTD - AAA (Accounting only) to extenral radius server</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ftd-aaa-accounting-only-to-extenral-radius-server/m-p/4843356#M1100895</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Streaming to Multiple Syslog Servers&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;You can stream audit log data to a maximum of five Syslog servers. However, if you have enabled TLS for secured audit log streaming, you can stream only to a single Syslog server.&lt;/P&gt;
&lt;P&gt;Classic devices also maintain audit logs. To stream audit logs from Classic devices, see &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/firepower_platform_settings_for_classic_devices.html#id_118442" target="_blank"&gt;Stream Audit Logs from Classic Devices&lt;/A&gt;.&lt;/P&gt;
&lt;UL&gt;
 &lt;LI&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/system_configuration.html#ID-2258-00000149" target="_blank"&gt;Stream Audit Logs to Syslog&lt;/A&gt;&lt;/LI&gt;
 &lt;LI&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/system_configuration.html#ID-2258-00000149" target="_blank"&gt;Stream Audit Logs to an HTTP Server&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;1&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Choose &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;System &lt;/STRONG&gt;&lt;/SPAN&gt;&amp;gt; &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Configuration&lt;/STRONG&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Click &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Audit Log&lt;/STRONG&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;3&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Choose &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Enabled&lt;/STRONG&gt;&lt;/SPAN&gt; from the &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Send Audit Log to Syslog&lt;/STRONG&gt;&lt;/SPAN&gt; drop-down menu.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;4&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;The following fields are applicable only for audit logs sent to syslog:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;5&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;(Optional) To test whether the IP address of the syslog servers is valid, click &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Test Syslog Server&lt;/STRONG&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;The system sends the following packets to verify whether the Syslog server is reachable:&lt;/P&gt;
&lt;P&gt;ICMP echo request&lt;/P&gt;
&lt;P&gt;TCP SYN on 443 and 80 ports&lt;/P&gt;
&lt;P&gt;ICMP time stamp query&lt;/P&gt;
&lt;P&gt;TCP SYN on random ports&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;6&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Click &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Save&lt;/STRONG&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;H3&gt;Stream Audit Logs to an HTTP Server&lt;/H3&gt;
&lt;P&gt;When this feature is enabled, the appliance sends audit log records to an HTTP server in the following format:&lt;/P&gt;
&lt;P&gt;&lt;I&gt;Date&lt;/I&gt; &lt;I&gt;Time&lt;/I&gt; &lt;I&gt;Host&lt;/I&gt; [&lt;I&gt;Tag&lt;/I&gt;] &lt;I&gt;Sender&lt;/I&gt;: &lt;I&gt;User_Name&lt;/I&gt;@&lt;I&gt;User_IP&lt;/I&gt;, &lt;I&gt;Subsystem&lt;/I&gt;, &lt;I&gt;Action&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;Where the local date, time, and originating hostname precede the bracketed optional tag, and the sending appliance or device name precedes the audit log message.&lt;/P&gt;
&lt;P&gt;For example, if you specify a tag of FROMMC, a sample audit log message could appear as follows:&lt;/P&gt;
&lt;P&gt;Mar 01 14:45:24 localhost [FROMMC] Dev-MC7000: admin@10.1.1.2, Operations &amp;gt; Monitoring, Page View&lt;/P&gt;
&lt;P&gt;To stream audit logs from Classic devices, use device platform settings: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/firepower_platform_settings_for_classic_devices.html#id_118442" target="_blank"&gt;Stream Audit Logs from Classic Devices&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Before you begin&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;Make sure the device can communicate with the HTTP server. Optionally, secure the channel; see &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/system_configuration.html#ID-2241-0000012c" target="_blank"&gt;Audit Log Certificate&lt;/A&gt;.&lt;/P&gt;
&lt;H4&gt;&lt;STRONG&gt;Procedure&lt;/STRONG&gt;&lt;/H4&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;1&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Choose &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;System &lt;/STRONG&gt;&lt;/SPAN&gt;&amp;gt; &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Configuration&lt;/STRONG&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;2&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Click &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Audit Log&lt;/STRONG&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;3&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Optionally, in the &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Tag&lt;/STRONG&gt;&lt;/SPAN&gt; field, enter the tag name that you want to appear with the message. For example, if you want all audit log records to be preceded with FROMMC, enter FROMMC in the field.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;4&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Choose &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Enabled&lt;/STRONG&gt;&lt;/SPAN&gt; from the &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Send Audit Log to HTTP Server&lt;/STRONG&gt;&lt;/SPAN&gt; drop-down list.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;5&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;In the &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;URL to Post Audit&lt;/STRONG&gt;&lt;/SPAN&gt; field, designate the URL where you want to send the audit information. Enter a URL that corresponds to a Listener program that expects the HTTP POST variables as listed:&lt;/P&gt;
&lt;P&gt;subsystem&lt;/P&gt;
&lt;P&gt;actor&lt;/P&gt;
&lt;P&gt;event_type&lt;/P&gt;
&lt;P&gt;message&lt;/P&gt;
&lt;P&gt;action_source_ip&lt;/P&gt;
&lt;P&gt;action_destination_ip&lt;/P&gt;
&lt;P&gt;result&lt;/P&gt;
&lt;P&gt;time&lt;/P&gt;
&lt;P&gt;tag (if defined; see Step 3)&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Caution&lt;/STRONG&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To allow encrypted posts, use an HTTPS URL. Sending audit information to an external URL may affect system performance.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Step&amp;nbsp;6&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Click &lt;SPAN style="font-size:inherit;"&gt;&lt;STRONG&gt;Save&lt;/STRONG&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please refer the below link for reference - &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/system_configuration.html#ID-2258-00000149" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/system_configuration.html#ID-2258-00000149&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 May 2023 07:49:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ftd-aaa-accounting-only-to-extenral-radius-server/m-p/4843356#M1100895</guid>
      <dc:creator>srigovi2</dc:creator>
      <dc:date>2023-05-26T07:49:35Z</dc:date>
    </item>
  </channel>
</rss>

