<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi Anthony, in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asdm-for-multiple-asa-monitoring/m-p/2849815#M914388</link>
    <description>&lt;P&gt;Hi Anthony,&lt;/P&gt;
&lt;P&gt;regarding the historical data i think what you need is syslog server which will gather the information for anything you need according to your syslog enabled level 0 - 7&lt;/P&gt;
&lt;P&gt;also for the VPN sessions i used event list from the ASA firewall that will send me any information for a VPN sessions to email&lt;/P&gt;
&lt;P&gt;that can help you with troubleshooting, documentation, logs.&lt;/P&gt;
&lt;P&gt;for the syslog you can use kiwilogs to save the logs into text, with sizes reaches to N of gigabytes&lt;/P&gt;
&lt;P&gt;also you can take that log and use logs analyzer to view the data as a graph which is really great.&lt;/P&gt;
&lt;P&gt;Hope that helped&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Samer.&lt;/P&gt;</description>
    <pubDate>Fri, 19 Feb 2016 17:13:09 GMT</pubDate>
    <dc:creator>Samer R. Saleem</dc:creator>
    <dc:date>2016-02-19T17:13:09Z</dc:date>
    <item>
      <title>ASDM for multiple ASA monitoring</title>
      <link>https://community.cisco.com/t5/network-security/asdm-for-multiple-asa-monitoring/m-p/2849812#M914382</link>
      <description>&lt;P&gt;I have a request from on high to monitor existing ASA firewalls using only ASDM. &amp;nbsp;The need I have is to be able to monitor multiple devices for a variety of reasons --- from interface traffic to VPN sessions, etc. &amp;nbsp;I've been using snmp regularly to get what I need, but I don't see a way to get consistent, historical data on multiple devices using ASDM. &amp;nbsp;At least not in any practical sense.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I wanted to get community feedback on this problem. &amp;nbsp;It seems running multiple instances of ASDM on a single machine to keep track of more than a couple ASAs at once is wholly impractical. &amp;nbsp;What does everyone think?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 13:43:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-for-multiple-asa-monitoring/m-p/2849812#M914382</guid>
      <dc:creator>anthonyg10</dc:creator>
      <dc:date>2020-02-21T13:43:49Z</dc:date>
    </item>
    <item>
      <title>You can run multiple copies</title>
      <link>https://community.cisco.com/t5/network-security/asdm-for-multiple-asa-monitoring/m-p/2849813#M914384</link>
      <description>&lt;P&gt;You can run multiple copies of ASDM on one machine (have done it many times myself). &amp;nbsp;I don't think I would open up more than 2 or 3 at once though. &amp;nbsp;They all look the same. &amp;nbsp;You have to keep checking the title bar to make sure you are working on the correct one.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It sounds like your needs would be better met using SNMP ...&lt;/P&gt;</description>
      <pubDate>Mon, 15 Feb 2016 18:54:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-for-multiple-asa-monitoring/m-p/2849813#M914384</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-02-15T18:54:53Z</dc:date>
    </item>
    <item>
      <title>That's pretty much what I was</title>
      <link>https://community.cisco.com/t5/network-security/asdm-for-multiple-asa-monitoring/m-p/2849814#M914386</link>
      <description>&lt;P&gt;That's pretty much what I was thinking --- limitations on how many instances I can run, actual historical information on a device, setting up the GUI each time to graph and chart what I need to see... etc.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;When I can setup an snmp server and start grabbing traffic and health and VPN info right off the bat and let it run on multiple targets continuously and do it more efficiently, it makes the approach a lot more sensible.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 16 Feb 2016 15:03:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-for-multiple-asa-monitoring/m-p/2849814#M914386</guid>
      <dc:creator>anthonyg10</dc:creator>
      <dc:date>2016-02-16T15:03:28Z</dc:date>
    </item>
    <item>
      <title>Hi Anthony,</title>
      <link>https://community.cisco.com/t5/network-security/asdm-for-multiple-asa-monitoring/m-p/2849815#M914388</link>
      <description>&lt;P&gt;Hi Anthony,&lt;/P&gt;
&lt;P&gt;regarding the historical data i think what you need is syslog server which will gather the information for anything you need according to your syslog enabled level 0 - 7&lt;/P&gt;
&lt;P&gt;also for the VPN sessions i used event list from the ASA firewall that will send me any information for a VPN sessions to email&lt;/P&gt;
&lt;P&gt;that can help you with troubleshooting, documentation, logs.&lt;/P&gt;
&lt;P&gt;for the syslog you can use kiwilogs to save the logs into text, with sizes reaches to N of gigabytes&lt;/P&gt;
&lt;P&gt;also you can take that log and use logs analyzer to view the data as a graph which is really great.&lt;/P&gt;
&lt;P&gt;Hope that helped&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Samer.&lt;/P&gt;</description>
      <pubDate>Fri, 19 Feb 2016 17:13:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-for-multiple-asa-monitoring/m-p/2849815#M914388</guid>
      <dc:creator>Samer R. Saleem</dc:creator>
      <dc:date>2016-02-19T17:13:09Z</dc:date>
    </item>
    <item>
      <title>I agree - wholly impractical.</title>
      <link>https://community.cisco.com/t5/network-security/asdm-for-multiple-asa-monitoring/m-p/2849816#M914389</link>
      <description>&lt;P&gt;I agree - wholly impractical.&lt;/P&gt;
&lt;P&gt;Like others suggested, use a simple syslog server and I would add an SNMP tool. Something like PRTG can be easily setup to monitor interface traffic VPN sessions etc.&lt;/P&gt;
&lt;P&gt;You can monitor up to 100 sensors (i.e individual SNMP elements - managing an ASA could use up several like pinging for uptime, monitoring an interface, monitoring VPN users etc.) with the free version.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Feb 2016 16:58:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asdm-for-multiple-asa-monitoring/m-p/2849816#M914389</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-02-21T16:58:47Z</dc:date>
    </item>
  </channel>
</rss>

