cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
396
Views
0
Helpful
1
Replies

Monitoring/Detecting unauthorsied connection attempts to the Pix

stuart.jones
Level 1
Level 1

Hi,

Can anyone suggest the best method from monitoring or detecting unauthorised connection attempts to the Pix FW interfaces, i.e attempts to connect and gain access ?

My Pix's are syslogging but are internet facing so these logs are quite big.

Any advice appreciated.

1 Reply 1

mchin345
Level 6
Level 6

You can use authentication provide by third party or local database or security authetication.

For example:

PIX/ASA : Cut-through Proxy for Network Access using TACACS+ and RADIUS Server Configuration Example

http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a00807349e7.shtml#configure-database

Review Cisco Networking for a $25 gift card