SlideShare a Scribd company logo
1 of 2
   Logging means that an entry is made in a log file for every
    message that is processed by the router
   The log lets you see how users are using the WLAN
    ◦ What protocols and port numbers are being used
    ◦ What source IPs and destination Ips and URLS
    ◦ What date and time the messages were processed
   Logs are used for security
    ◦ To verify that security settings are correct by checking that only permitted
      traffic enters from the outside
    ◦ To discover threats by analysing the packets dropped on the outside
    ◦ To verify that inside users are complying with the security policy and are
      using the network correctly and appropriately i.e. not using torrent
      software and browsing to malicious or inappropriate sites in violation of
      security policy
   Logs must be stored securely
    ◦ Access to logs must be restricted and monitored to prevent unauthorised
      changes, particularly if logs will be used as evidence of wrong doing
   Logs are used for capacity planning
    ◦ The data in log files can be loaded into analytics software for
      trend analysis
    ◦ Logs can show data flows that cross networks
       For instance, a data flow might occur every morning at 8:30 as
        everyone starts work and authenticates to the domain controller
       Data flows are used to show trends in usage over a period of time
        so that the volume of data crossing links can be predicted
       Plans can be made and implemented to upgrade equipment and
        links before the users notice a decrease in their network
        performance (speed) due to congestion and load

More Related Content

Viewers also liked

Estructura de un computador
Estructura de un computadorEstructura de un computador
Estructura de un computadorenderramonesb
 
VERIFICAÇÃO DA REFRAÇÃO E REFLEXÃO DA LUZ
VERIFICAÇÃO DA REFRAÇÃO E REFLEXÃO DA LUZVERIFICAÇÃO DA REFRAÇÃO E REFLEXÃO DA LUZ
VERIFICAÇÃO DA REFRAÇÃO E REFLEXÃO DA LUZBenedita Serrano
 
Saddam resume copy
Saddam resume   copySaddam resume   copy
Saddam resume copySaddam Khan
 
Articulo investigacion
Articulo investigacionArticulo investigacion
Articulo investigacionKarlii Aquino
 
提升英文聽說能力威爾斯美語補習班好口碑
提升英文聽說能力威爾斯美語補習班好口碑提升英文聽說能力威爾斯美語補習班好口碑
提升英文聽說能力威爾斯美語補習班好口碑pccenter
 

Viewers also liked (10)

Proficiência
ProficiênciaProficiência
Proficiência
 
Estructura de un computador
Estructura de un computadorEstructura de un computador
Estructura de un computador
 
VERIFICAÇÃO DA REFRAÇÃO E REFLEXÃO DA LUZ
VERIFICAÇÃO DA REFRAÇÃO E REFLEXÃO DA LUZVERIFICAÇÃO DA REFRAÇÃO E REFLEXÃO DA LUZ
VERIFICAÇÃO DA REFRAÇÃO E REFLEXÃO DA LUZ
 
Dilip resume
Dilip resumeDilip resume
Dilip resume
 
Saddam resume copy
Saddam resume   copySaddam resume   copy
Saddam resume copy
 
Articulo investigacion
Articulo investigacionArticulo investigacion
Articulo investigacion
 
Calendário o
Calendário oCalendário o
Calendário o
 
提升英文聽說能力威爾斯美語補習班好口碑
提升英文聽說能力威爾斯美語補習班好口碑提升英文聽說能力威爾斯美語補習班好口碑
提升英文聽說能力威爾斯美語補習班好口碑
 
Nacionalidades
NacionalidadesNacionalidades
Nacionalidades
 
Croquis
CroquisCroquis
Croquis
 

Similar to Logging

A. Monitoring Internet Endpoints and Bandwidth Consumption1. NetFl.pdf
A. Monitoring Internet Endpoints and Bandwidth Consumption1. NetFl.pdfA. Monitoring Internet Endpoints and Bandwidth Consumption1. NetFl.pdf
A. Monitoring Internet Endpoints and Bandwidth Consumption1. NetFl.pdfMAYANKBANSAL1981
 
Log maintenance network securiy
Log maintenance  network securiyLog maintenance  network securiy
Log maintenance network securiyMohsin Ali
 
The Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptxThe Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptxawakish
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensicsAnpumathews
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
Reasons For Using Data Logger
Reasons For Using Data LoggerReasons For Using Data Logger
Reasons For Using Data LoggerInfyiot Solutions
 
Protocol design issue and computer networks protocol
Protocol  design issue and computer networks protocolProtocol  design issue and computer networks protocol
Protocol design issue and computer networks protocolmohsin327164
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptxJaleto Sunkemo
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfTadeseBeyene
 
infoAssurance (1).pptx
infoAssurance (1).pptxinfoAssurance (1).pptx
infoAssurance (1).pptxStevenJoeBiago
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management nullowaspmumbai
 
First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]Phil Huggins FBCS CITP
 
installandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxinstallandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxTeshome48
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the InternetAdjeiKwadjo
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdftalkaton
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxtalkaton
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 

Similar to Logging (20)

A. Monitoring Internet Endpoints and Bandwidth Consumption1. NetFl.pdf
A. Monitoring Internet Endpoints and Bandwidth Consumption1. NetFl.pdfA. Monitoring Internet Endpoints and Bandwidth Consumption1. NetFl.pdf
A. Monitoring Internet Endpoints and Bandwidth Consumption1. NetFl.pdf
 
Log maintenance network securiy
Log maintenance  network securiyLog maintenance  network securiy
Log maintenance network securiy
 
The Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptxThe Role of Port Monitoring for Network Uptime - March.pptx
The Role of Port Monitoring for Network Uptime - March.pptx
 
Introduction to cyber forensics
Introduction to cyber forensicsIntroduction to cyber forensics
Introduction to cyber forensics
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
Reasons For Using Data Logger
Reasons For Using Data LoggerReasons For Using Data Logger
Reasons For Using Data Logger
 
CN PPT
CN PPTCN PPT
CN PPT
 
Protocol design issue and computer networks protocol
Protocol  design issue and computer networks protocolProtocol  design issue and computer networks protocol
Protocol design issue and computer networks protocol
 
install and manage network protocols.pptx
install and manage network protocols.pptxinstall and manage network protocols.pptx
install and manage network protocols.pptx
 
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdfinstallandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
installandmanagenetworkprotocols-221219130255-40dcfff3 (1).pdf
 
infoAssurance (1).pptx
infoAssurance (1).pptxinfoAssurance (1).pptx
infoAssurance (1).pptx
 
Infrastructure security & Incident Management
Infrastructure security & Incident Management Infrastructure security & Incident Management
Infrastructure security & Incident Management
 
9780840024220 ppt ch08
9780840024220 ppt ch089780840024220 ppt ch08
9780840024220 ppt ch08
 
First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]First Responders Course - Session 4 - Forensic Readiness [2004]
First Responders Course - Session 4 - Forensic Readiness [2004]
 
installandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptxinstallandmanagenetworkprotocols.pptx
installandmanagenetworkprotocols.pptx
 
Introduction to the Internet
Introduction to the InternetIntroduction to the Internet
Introduction to the Internet
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 
Network Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptxNetwork Analysis Mini Project 2.pptx
Network Analysis Mini Project 2.pptx
 
Network security
Network securityNetwork security
Network security
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 

More from lyndyv

Datarate
DatarateDatarate
Dataratelyndyv
 
Policy
PolicyPolicy
Policylyndyv
 
Security standard
Security standardSecurity standard
Security standardlyndyv
 
Auth and association
Auth and associationAuth and association
Auth and associationlyndyv
 
Port forward
Port forwardPort forward
Port forwardlyndyv
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilterslyndyv
 
Firewall
FirewallFirewall
Firewalllyndyv
 
Csmaca
CsmacaCsmaca
Csmacalyndyv
 
Basic config
Basic configBasic config
Basic configlyndyv
 
Service set
Service setService set
Service setlyndyv
 
Signals1
Signals1Signals1
Signals1lyndyv
 
Modulation
ModulationModulation
Modulationlyndyv
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
Wireless components
Wireless componentsWireless components
Wireless componentslyndyv
 

More from lyndyv (16)

Datarate
DatarateDatarate
Datarate
 
Policy
PolicyPolicy
Policy
 
Security standard
Security standardSecurity standard
Security standard
 
Auth and association
Auth and associationAuth and association
Auth and association
 
Dhcp
DhcpDhcp
Dhcp
 
Port forward
Port forwardPort forward
Port forward
 
Nat
NatNat
Nat
 
Mac addressfilters
Mac addressfiltersMac addressfilters
Mac addressfilters
 
Firewall
FirewallFirewall
Firewall
 
Csmaca
CsmacaCsmaca
Csmaca
 
Basic config
Basic configBasic config
Basic config
 
Service set
Service setService set
Service set
 
Signals1
Signals1Signals1
Signals1
 
Modulation
ModulationModulation
Modulation
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Wireless components
Wireless componentsWireless components
Wireless components
 

Logging

  • 1. Logging means that an entry is made in a log file for every message that is processed by the router  The log lets you see how users are using the WLAN ◦ What protocols and port numbers are being used ◦ What source IPs and destination Ips and URLS ◦ What date and time the messages were processed  Logs are used for security ◦ To verify that security settings are correct by checking that only permitted traffic enters from the outside ◦ To discover threats by analysing the packets dropped on the outside ◦ To verify that inside users are complying with the security policy and are using the network correctly and appropriately i.e. not using torrent software and browsing to malicious or inappropriate sites in violation of security policy  Logs must be stored securely ◦ Access to logs must be restricted and monitored to prevent unauthorised changes, particularly if logs will be used as evidence of wrong doing
  • 2. Logs are used for capacity planning ◦ The data in log files can be loaded into analytics software for trend analysis ◦ Logs can show data flows that cross networks  For instance, a data flow might occur every morning at 8:30 as everyone starts work and authenticates to the domain controller  Data flows are used to show trends in usage over a period of time so that the volume of data crossing links can be predicted  Plans can be made and implemented to upgrade equipment and links before the users notice a decrease in their network performance (speed) due to congestion and load