Cisco Systems OL-16647-01 Network Router User Manual


  Open as PDF
of 1230
 
44-7
Cisco ASDM User Guide
OL-16647-01
Chapter 44 Monitoring Properties
Monitoring Device Access
Prerequisites
You are connected to the security appliance using ASDM.
You have already completed the initial security appliance configurations included in the ASDM
startup wizard. For more information, see Using the Startup Wizard, page 5-1.
You have already configured the servers and server groups that are being managed by the security
appliance. For more information, see the Summary of Support, page 14-3.
You have already configured the user accounts that are being managed by the security appliance
Local server. For more information, see Adding a User Account, page 14-18.
You have already configured authentication for the security appliance using the section, About
Authentication, page 14-2.
Procedure
To monitor information about users who have successfully authenticated, perform the following steps:
Step 1 From the ASDM toolbar, click Monitoring.
The monitoring functions display in the left-hand Navigation pane.
Step 2 Click Properties.
The Properties Navigation pane opens.
Step 3 Click the plus (+) symbol next to Device Access.
The list of Device Access functions expands below it.
Step 4 Click Authenticated Users.
The Authenticated Users dialog box opens in the right-hand pane, displaying a list of users who have
successfully authenticated with an AAA server.
Monitoring Active Sessions
This section includes the following procedures:
Viewing Active Sessions, page 44-7
Disconnecting an Active Session, page 44-9
Viewing Active Sessions
Use this procedure to view the sessions that are currently connected to the security appliance.
Prerequisites
You are connected to the security appliance using ASDM.
You have already completed the initial security appliance configurations included in the ASDM
startup wizard. For more information, see Using the Startup Wizard, page 5-1.
You have already configured the servers and server groups that are being managed by the security
appliance. For more information, see the Summary of Support, page 14-3.
You have already configured the user accounts that are being managed by the security appliance
Local server. For more information, see Adding a User Account, page 14-18.