Skip to main content

Configure Cisco IOS Devices

Netwrix Auditor relies on native logs for collecting audit data. Therefore, successful change and access auditing requires a certain configuration of native audit settings in the audited environment and on the Auditor console computer. Configuring your IT infrastructure may also include enabling certain built-in Windows services, etc. Proper audit configuration is required to ensure audit data integrity, otherwise your change reports may contain warnings, errors or incomplete audit data.

CAUTION: Folder associated with Netwrix Auditor must be excluded from antivirus scanning. See the Antivirus Exclusions for Netwrix Auditor knowledge base article for additional information.

You can configure your IT Infrastructure for monitoring in one of the following ways:

  • Automatically through a monitoring plan – This is a recommended method. If you select to automatically configure audit in the target environment, your current audit settings will be checked on each data collection and adjusted if necessary.

  • Manually – Native audit settings must be adjusted manually to ensure collecting comprehensive and reliable audit data. You can enable Auditor to continually enforce the relevant audit policies or configure them manually:

    • The global configuration mode is selected.
    • The logging timestamp option enabled.
    • The logging trap option is selected from 1 to 6 inclusive.
    • The logging host parameter is set to the host address where the service is going to be installed. And UDP port (for, example 514) is used for sending messages.

To configure your Cisco IOS devices, do the following:

  1. Navigate to your Cisco IOS device terminal through the SSH/Telnet connection (for example, use PuTTY Telnet client).

  2. Access the global configuration mode. For example:

    Router# configure terminal

  3. Enable time stamps in syslog messages:

    Router# service timestamps log datetime localtime show-timezone

  4. Set the logging trap option from 1 to 6 inclusive. For example:

    Router# logging trap 5

  5. Set the IP address of the Netwrix Auditor Server as the logging host parameter. And make sure that the UDP port is used for sending syslog messages (e.g., 514 UDP port). For example:

    Router# logging 192.168.1.5

Cisco IOS Devices

Review a full list of object types Netwrix Auditor can collect on Cisco IOS network devices.

Object typeActionsEvent ID
---------
---------
Cisco IOS
Attribute- Read- INFO: AAA/ATTR
Authentication- Successful logon- IKEv2:
- Failed logon- IKEv2-ERROR:
Configuration- Modified- CONFIG_I
Device state- Modified- UPDOWN - CHANGED
Environment- Modified- FAN_FAULT - OVER_TEMP
Logon- Successful logon- LOGIN_SUCCESS
- Failed logon- LOGIN_FAILED
Session- Successful Logon- IKEv2:
- Logoff- %FW-6-SESS_AUDIT_TRAIL
- Failed Logon- IKEv2-ERROR: