<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewall syslog in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firewall-syslog/m-p/1350875#M759926</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vinu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The severity level depends on the output log message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;A name="wp3050146"&gt;&lt;/A&gt;&lt;A name="wpxref48625"&gt;&lt;/A&gt;&lt;SPAN class="pEM_ErrMsg"&gt;&lt;SPAN class="cBoldNormal"&gt;Error Message&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt; %ASA-6-716039: Authentication: rejected, group = &lt;EM class="cCi_CmdItalic"&gt;name&lt;/EM&gt; user = &lt;EM class="cCi_CmdItalic"&gt;user&lt;/EM&gt;, 
Session Type: WebVPN
&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;A name="wp3050147"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pEE_ErrExp"&gt;&lt;SPAN class="cBoldNormal"&gt;Explanation&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt; Before a WebVPN session starts, the user must be authenticated successfully by a local or remote server (for example, RADIUS or TACACS+). In this case, the user credentials (user name and password) either did not match or the user does not have permission to start a WebVPN session.&lt;/P&gt;&lt;P&gt;&lt;A name="wp3050148"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pEA_ErrAct"&gt;&lt;SPAN class="cBoldNormal"&gt;Recommended Action&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt; Verify the user credentials on the local or remote server. Verify that WebVPN is configured for the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above is severity 6 and log message number including username affected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This urls will provide all the info you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/system/message/logmsgs.html#wpxref66501"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/system/message/logmsgs.html#wpxref66501&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (searcg for vpn will provide you all logs and severity for vpn)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/system/message/logsev.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/system/message/logsev.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 05 Mar 2010 12:48:56 GMT</pubDate>
    <dc:creator>francisco_1</dc:creator>
    <dc:date>2010-03-05T12:48:56Z</dc:date>
    <item>
      <title>Firewall syslog</title>
      <link>https://community.cisco.com/t5/network-security/firewall-syslog/m-p/1350873#M759905</link>
      <description>&lt;P&gt;HI,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we are using PIx 515E as our firewall in our network&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In Firewall we configured remote VPN access for users to access from home&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;now we are planning to moniotor who is authenticated on remote VPN through the syslog server&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;which faclilty level will give the information of authenticting remote user details&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks inadvance&lt;/P&gt;&lt;P&gt;vinu&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:17:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-syslog/m-p/1350873#M759905</guid>
      <dc:creator>vinoth.kumar</dc:creator>
      <dc:date>2019-03-11T17:17:50Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall syslog</title>
      <link>https://community.cisco.com/t5/network-security/firewall-syslog/m-p/1350874#M759916</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Refer this link:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa80/system/message/logmsgs.html#wp5602670"&gt;http://www.cisco.com/en/US/docs/security/asa/asa80/system/message/logmsgs.html#wp5602670&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;109006&lt;BR /&gt;113005&lt;BR /&gt;113015&lt;BR /&gt;113016&lt;BR /&gt;113017&lt;BR /&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Mar 2010 12:38:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-syslog/m-p/1350874#M759916</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-03-05T12:38:10Z</dc:date>
    </item>
    <item>
      <title>Re: Firewall syslog</title>
      <link>https://community.cisco.com/t5/network-security/firewall-syslog/m-p/1350875#M759926</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Vinu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The severity level depends on the output log message.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;&lt;A name="wp3050146"&gt;&lt;/A&gt;&lt;A name="wpxref48625"&gt;&lt;/A&gt;&lt;SPAN class="pEM_ErrMsg"&gt;&lt;SPAN class="cBoldNormal"&gt;Error Message&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt; %ASA-6-716039: Authentication: rejected, group = &lt;EM class="cCi_CmdItalic"&gt;name&lt;/EM&gt; user = &lt;EM class="cCi_CmdItalic"&gt;user&lt;/EM&gt;, 
Session Type: WebVPN
&lt;/SPAN&gt;&lt;/PRE&gt;&lt;P&gt;&lt;A name="wp3050147"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pEE_ErrExp"&gt;&lt;SPAN class="cBoldNormal"&gt;Explanation&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt; Before a WebVPN session starts, the user must be authenticated successfully by a local or remote server (for example, RADIUS or TACACS+). In this case, the user credentials (user name and password) either did not match or the user does not have permission to start a WebVPN session.&lt;/P&gt;&lt;P&gt;&lt;A name="wp3050148"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P class="pEA_ErrAct"&gt;&lt;SPAN class="cBoldNormal"&gt;Recommended Action&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt; Verify the user credentials on the local or remote server. Verify that WebVPN is configured for the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The above is severity 6 and log message number including username affected.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This urls will provide all the info you need&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/system/message/logmsgs.html#wpxref66501"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/system/message/logmsgs.html#wpxref66501&lt;/A&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (searcg for vpn will provide you all logs and severity for vpn)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also &lt;A href="http://www.cisco.com/en/US/docs/security/asa/asa72/system/message/logsev.html"&gt;http://www.cisco.com/en/US/docs/security/asa/asa72/system/message/logsev.html&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Mar 2010 12:48:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firewall-syslog/m-p/1350875#M759926</guid>
      <dc:creator>francisco_1</dc:creator>
      <dc:date>2010-03-05T12:48:56Z</dc:date>
    </item>
  </channel>
</rss>

