
44-7
Cisco ASDM User Guide
OL-16647-01
Chapter 44 Monitoring Properties
Monitoring Device Access
Prerequisites
• You are connected to the security appliance using ASDM.
• You have already completed the initial security appliance configurations included in the ASDM
startup wizard. For more information, see Using the Startup Wizard, page 5-1.
• You have already configured the servers and server groups that are being managed by the security
appliance. For more information, see the Summary of Support, page 14-3.
• You have already configured the user accounts that are being managed by the security appliance
Local server. For more information, see Adding a User Account, page 14-18.
• You have already configured authentication for the security appliance using the section, About
Authentication, page 14-2.
Procedure
To monitor information about users who have successfully authenticated, perform the following steps:
Step 1 From the ASDM toolbar, click Monitoring.
The monitoring functions display in the left-hand Navigation pane.
Step 2 Click Properties.
The Properties Navigation pane opens.
Step 3 Click the plus (+) symbol next to Device Access.
The list of Device Access functions expands below it.
Step 4 Click Authenticated Users.
The Authenticated Users dialog box opens in the right-hand pane, displaying a list of users who have
successfully authenticated with an AAA server.
Monitoring Active Sessions
This section includes the following procedures:
• Viewing Active Sessions, page 44-7
• Disconnecting an Active Session, page 44-9
Viewing Active Sessions
Use this procedure to view the sessions that are currently connected to the security appliance.
Prerequisites
• You are connected to the security appliance using ASDM.
• You have already completed the initial security appliance configurations included in the ASDM
startup wizard. For more information, see Using the Startup Wizard, page 5-1.
• You have already configured the servers and server groups that are being managed by the security
appliance. For more information, see the Summary of Support, page 14-3.
• You have already configured the user accounts that are being managed by the security appliance
Local server. For more information, see Adding a User Account, page 14-18.