Examples
This page provides some real world scenarios giving you guidance on how to configure the Log Exporter for your scenario.
Last updated
This page provides some real world scenarios giving you guidance on how to configure the Log Exporter for your scenario.
Last updated
The scope of the query provided below is as follows:
The admin is interested in understanding which users and/or devices are authenticating (successful or unsuccessful) and to built frequency statistics based on that
No VLAN tagging is used
Only certificate-based authentication is used (no username-password-based authentication)
Log Analytics or General Webhook
Log Level | Enabled |
---|---|
The scope of the query provided below is as follows:
The admin is interested in understanding which users and/or devices are authenticating (successful or unsuccessful)
The OCSP response of the CA if certificates are used
The used Access Point (via MAC address)
The RADIUS Rule that was triggered / VLAN that was tagged
Both, certificate-based authentication and username-password-based authentication are considered
Log Analytics or General Webhook
The scope of the query provided below is as follows:
The admin is interested in receiving pro-active notifications about errors on the RADIUSaaS platform for the operations team.
Log Level | Enabled |
---|---|
Log Level | Enabled |
---|---|
Log Level | Enabled |
---|---|
Log Level | Enabled |
---|---|
Log Level | Enabled |
---|---|
Log Level | Enabled |
---|---|
Log Level | Enabled |
---|---|
Log Level | Enabled |
---|---|
Success
False
Failed
False
Error
False
Requests
False
Success
True
Failed
True
Error
False
Connections
False
Success
False
Failed
False
Error
False
Success
True
Failed
True
Error
False
Requests
False
Success
False
Failed
False
Error
False
Connections
False
Success
False
Failed
False
Error
False
Success
False
Failed
False
Error
False
Requests
False
Success
False
Failed
False
Error
True
Connections
False
Success
False
Failed
False
Error
True