Depending on your firewall hardware you may be able to get the details from the 
WLC into the firewall logs. We use a Palo Alto and there is a document on how 
to use the SNMP traps to associate a user at the firewall. See 
https://supportforums.cisco.com/sites/default/files/attachments/discussion/cisco_wlc_-_palo_alto_networks_config_guide.pdf.
 It is a little out of data as we are running the 7.x PA code but I was able to 
make it work. I’m using snmptrapd, syslog-ng, and sec for my stack.

It may also help you decode the SNMP traps. I used this as my guide to use sec, 
simple event correlator, to create a text log of which users were on which APs 
at what time. We have Prime but the text file is easier to keep for a long time 
compared with the Prime association history logs.

Tim Wier
Network Manager
Concordia University Chicago
tim.w...@cuchicago.edu<mailto:tim.w...@cuchicago.edu>
708-209-3565

From: The EDUCAUSE Wireless Issues Constituent Group Listserv 
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of John York
Sent: Thursday, March 3, 2016 1:54 PM
To: WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU
Subject: Re: [WIRELESS-LAN] WLC 5508 logging authentications

We have Win NPS running Radius.  It takes several lookups to get what I want 
and I was hoping to shorten the process.  A typical one goes like this:

Receive:  outside IP, port, and time
Lookup in firewall NAT logs
Output:  inside IP, time
Lookup IP in DHCP logs
Output:   MAC address, time
Lookup MAC in NPS logs
Output:  username

From: The EDUCAUSE Wireless Issues Constituent Group Listserv 
[mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU] On Behalf Of Dennis Xu
Sent: Thursday, March 3, 2016 12:08 PM
To: 
WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU<mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU>
Subject: Re: [WIRELESS-LAN] WLC 5508 logging authentications

Hi John,

You are right that WLCs do not log authentication sessions in syslog. Do you 
have Radius servers to authenticate wireless users? Radius server is the better 
place to collect authentication logs.

Regards,

Dennis Xu, MASc, CCIE #13056
Analyst 3, Network Infrastructure
Computing and Communications Services(CCS)
University of Guelph

519-824-4120 Ext 56217
d...@uoguelph.ca<mailto:d...@uoguelph.ca>
www.uoguelph.ca/ccs<http://www.uoguelph.ca/ccs>

________________________________
From: "John York" <yo...@brcc.edu<mailto:yo...@brcc.edu>>
To: 
WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU<mailto:WIRELESS-LAN@LISTSERV.EDUCAUSE.EDU>
Sent: Thursday, March 3, 2016 11:29:56 AM
Subject: [WIRELESS-LAN] WLC 5508 logging authentications

Hi
We have one 5508 (soon to be a failover pair) and don’t run PI. Our users 
connect either through 802.1x or an open SSID with a webauth portal from the 
5508.  I need to be able to log authentications so I can track down users who 
have annoyed DMCA or our security department.  I’m finding that 5508 syslog 
outputs a huge amount of stuff, but doesn’t include successful authentications. 
 I’ve found some posts that indicate that info is only available through SNMP 
traps, but I haven’t been able to find the OIDs.  Has anyone been able to log 
auths without using PI?
Thanks
John
********** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/.

********** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/.
********** Participation and subscription information for this EDUCAUSE 
Constituent Group discussion list can be found at 
http://www.educause.edu/groups/.

**********
Participation and subscription information for this EDUCAUSE Constituent Group 
discussion list can be found at http://www.educause.edu/groups/.

Reply via email to