SlideShare a Scribd company logo
   Logging means that an entry is made in a log file for every
    message that is processed by the router
   The log lets you see how users are using the WLAN
    ◦ What protocols and port numbers are being used
    ◦ What source IPs and destination Ips and URLS
    ◦ What date and time the messages were processed
   Logs are used for security
    ◦ To verify that security settings are correct by checking that only permitted
      traffic enters from the outside
    ◦ To discover threats by analysing the packets dropped on the outside
    ◦ To verify that inside users are complying with the security policy and are
      using the network correctly and appropriately i.e. not using torrent
      software and browsing to malicious or inappropriate sites in violation of
      security policy
   Logs must be stored securely
    ◦ Access to logs must be restricted and monitored to prevent unauthorised
      changes, particularly if logs will be used as evidence of wrong doing
   Logs are used for capacity planning
    ◦ The data in log files can be loaded into analytics software for
      trend analysis
    ◦ Logs can show data flows that cross networks
       For instance, a data flow might occur every morning at 8:30 as
        everyone starts work and authenticates to the domain controller
       Data flows are used to show trends in usage over a period of time
        so that the volume of data crossing links can be predicted
       Plans can be made and implemented to upgrade equipment and
        links before the users notice a decrease in their network
        performance (speed) due to congestion and load

More Related Content

DOC
Nick Pauze resume
DOCX
Hernandez torres 2
ODT
Hoteis barreirinhas
PDF
CERTIFICAT RISK ASS & JSA
PDF
Applied lean solutions palletizing 012813
PPTX
Continuous Integration в мобильной разработке
PPTX
Capacity
PDF
La Temperatura Corporal Baja De Los Sintomas
Nick Pauze resume
Hernandez torres 2
Hoteis barreirinhas
CERTIFICAT RISK ASS & JSA
Applied lean solutions palletizing 012813
Continuous Integration в мобильной разработке
Capacity
La Temperatura Corporal Baja De Los Sintomas

Viewers also liked (10)

PDF
Proficiência
PPTX
Estructura de un computador
DOCX
VERIFICAÇÃO DA REFRAÇÃO E REFLEXÃO DA LUZ
PDF
Dilip resume
DOC
Saddam resume copy
PDF
Articulo investigacion
PDF
Calendário o
PDF
提升英文聽說能力威爾斯美語補習班好口碑
DOCX
Nacionalidades
PDF
Croquis
Proficiência
Estructura de un computador
VERIFICAÇÃO DA REFRAÇÃO E REFLEXÃO DA LUZ
Dilip resume
Saddam resume copy
Articulo investigacion
Calendário o
提升英文聽說能力威爾斯美語補習班好口碑
Nacionalidades
Croquis
Ad

Similar to Logging (20)

PPTX
Log maintenance network securiy
PPTX
Wifi cannerddddddddddddddddddddddddddddddddddddddddddddd
PPTX
Power of logs: practices for network security
DOC
All Anton's Top11 Log Lists
PPTX
2_1 Local area networks.pptx NETWORKS,.
PPTX
PDF
Preventing The Next Data Breach Through Log Management
PPT
Making Logs Sexy Again: Can We Finally Lose The Regexes?
PPT
Logs for Information Assurance and Forensics @ USMA
PPT
Bcc comp4 ppt2
PPT
The importance of logs - DefCamp 2012
PPTX
TOPIC 4 WIRELESS TECHNOLOGIES AND BASIC SECURITY (1).pptx
PPTX
DevLink - WiFu: You think your wireless is secure?
PDF
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
PPTX
2_1 Local area networks.pptx
PPTX
Dncybersecurity
PPTX
Wireshark
PDF
All your logs are belong to you!
PDF
All Your Security Events Are Belong to ... You!
PPT
Logs & The Law: What is Admissible in Court?
Log maintenance network securiy
Wifi cannerddddddddddddddddddddddddddddddddddddddddddddd
Power of logs: practices for network security
All Anton's Top11 Log Lists
2_1 Local area networks.pptx NETWORKS,.
Preventing The Next Data Breach Through Log Management
Making Logs Sexy Again: Can We Finally Lose The Regexes?
Logs for Information Assurance and Forensics @ USMA
Bcc comp4 ppt2
The importance of logs - DefCamp 2012
TOPIC 4 WIRELESS TECHNOLOGIES AND BASIC SECURITY (1).pptx
DevLink - WiFu: You think your wireless is secure?
Logging : How much is too much? Network Security Monitoring Talk @ hasgeek
2_1 Local area networks.pptx
Dncybersecurity
Wireshark
All your logs are belong to you!
All Your Security Events Are Belong to ... You!
Logs & The Law: What is Admissible in Court?
Ad

More from lyndyv (16)

PPTX
Datarate
PPTX
Policy
PPTX
Security standard
PPTX
Auth and association
PPTX
Dhcp
PPTX
Port forward
PPTX
Nat
PPTX
Mac addressfilters
PPTX
Firewall
PPTX
Csmaca
PPTX
Basic config
PPTX
Service set
PPTX
Signals1
PPTX
Modulation
PPTX
IEEE WLAN standards
PPTX
Wireless components
Datarate
Policy
Security standard
Auth and association
Dhcp
Port forward
Nat
Mac addressfilters
Firewall
Csmaca
Basic config
Service set
Signals1
Modulation
IEEE WLAN standards
Wireless components

Logging

  • 1. Logging means that an entry is made in a log file for every message that is processed by the router  The log lets you see how users are using the WLAN ◦ What protocols and port numbers are being used ◦ What source IPs and destination Ips and URLS ◦ What date and time the messages were processed  Logs are used for security ◦ To verify that security settings are correct by checking that only permitted traffic enters from the outside ◦ To discover threats by analysing the packets dropped on the outside ◦ To verify that inside users are complying with the security policy and are using the network correctly and appropriately i.e. not using torrent software and browsing to malicious or inappropriate sites in violation of security policy  Logs must be stored securely ◦ Access to logs must be restricted and monitored to prevent unauthorised changes, particularly if logs will be used as evidence of wrong doing
  • 2. Logs are used for capacity planning ◦ The data in log files can be loaded into analytics software for trend analysis ◦ Logs can show data flows that cross networks  For instance, a data flow might occur every morning at 8:30 as everyone starts work and authenticates to the domain controller  Data flows are used to show trends in usage over a period of time so that the volume of data crossing links can be predicted  Plans can be made and implemented to upgrade equipment and links before the users notice a decrease in their network performance (speed) due to congestion and load