Information Technology Reference
In-Depth Information
IPAddress , UserID , Date , Time , Service , ServerName , RadiusAttributesList
The following is an example of an IAS log file entry:
10.0.0.151,jsmith,05/23/2005,13:16:29,IAS,SERVER3,6,2,7,1,5,9,61,5,64,1,65,1,31,1
Each line item consists of a number of comma-separated entries that correspond to the
following information:
IPAddress : The IP address of the network access server to which the client is connecting
( 10.0.0.151 in the preceding example).
UserID : The username being used to authenticate ( jsmith in the preceding example).
Date , Time : The date and time of the incoming connection request ( 05/23/2005,13:16:29 in
the preceding example).
Service : The name of the service being requested ( IAS in the preceding example).
ServerName : The name of the server that received the connection request ( SERVER3 in the
preceding example).
RadiusAttributesList : Correspond to RADIUS attributes such as the Service-Type
( 6,2,7,1,5,9,61,5,64,1,65,1,31,1 in the preceding example).
The database-compatible format creates log entries in the following format:
ComputerName,Service,Record-Date,Record-Time,Packet-Type,Username,
Fully-Qualified-Username,Called-Station-ID,Calling-Station-ID,Callback-Number,
Framed-IP-Address,NAS-Identifier,NAS-IP-Address,NAS-Port,Client-Vendor,
Client-IP-Address,Client-Friendly-Name,Event-Timestamp,Port-Limit,NAS-Port-Type,
Framed-Protocol,Service-Type,Authentication-Type,NP-Policy-Name,Reason-Code,
Class,Session-Timeout,Idle-Timeout,Termination-Action,EAP-Friendly-Name,
Acct-Status-Type,Acct-Delay-Time,Acct-Input-Octets,Acct-Output-Octets,
Acct-Session-ID,Acct-Authentic,Acct-Session-Time,Acct-Input,Packets,
Acct-Output-Packets,Acct-Terminate-Cause,Acct-Multi-Ssn-ID,Acct-Link-Count,
Acct-Interim-Value,Tunnel-Type,Tunnel-Medium-Type,Tunnel-Client-Endpt,
Tunnel-Server-Endpt,Acct-Tunnel-Connection,Tunnel-Pvt-Group-ID,
Tunnel-Assignment-ID,Tunnel-Preference,MS-Acct-Auth-Type,MS-Acct-EAP-Type,
MS-RAS-Version,MS-CHAP-Error,MS-CHAP-Domain,MS-MPPE-Encryption-Types,
MS-MPPE-Encryption-Policy
The following is an example of a database log entry. Notice that any headers that do not
contain data are denoted by comma delimiters.
"SERVER3","IAS",05/23/2005,13:16:29,1,"jsmith",,,,,,,,,9,"10.0.0.151","iasclient"
,,,,,,,1,,0,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,
Logging Information to a SQL Server
For a more flexible and extensible data storage option, you can log information to a SQL Server
database. This option requires you to specify the name of the SQL Server and database file to
Search WWH ::




Custom Search