@derelict said in Alerts for Remote VPN Access Use / Attempted Unautorized Use:
Graylog is free.
Awesome, but pfSense is not a log server. It is a firewall.
Thanks for passing this along - Do you use it? I'm wondering what you do (if your use case is similar - Home/Home Office-A few PCs, a couple of "Smart Devices/Media Players/IoT or similar)
or are you running a large network.
I would absolutely agree that it's not ideal as a log server and wouldn't work for a large setup.
@gertjan said in Alerts for Remote VPN Access Use / Attempted Unautorized Use:
When I inspected my "pfSense" logs - I'm using a remote (but local) log server, I do see lines like :
06-06-2018 12:00:12 Daemon.Notice 192.168.1.1 Jun 6 12:00:14 openvpn[32669]: 80.12.41.173:55353 [GertjaniPhone] Peer Connection Initiated with [AF_INET]80.12.41.173:55353
when I loggin with a VPN client on my VPN server (== pfSense).
Scripting against the log file with tools like fail2ban (or whatever hand written shell script) and you have your notification mail.
That's what I had in mind!
As @Derelict : I'm not keeping the logs (+100 Kbytes every day) on pfSense.
You have a FreeNAS system, so I guess you're close to a good solution.
If you have a similar use case to me, what software are you using?
This discussion has caused me to consider creating a log server on my FreeNAS.
Certainly I have the capacity to do it, just worried the learning curve for these other
tools may be too steep given my time constraints. Unless I have hardware issues
FreeNAS is always running when the other PCs are running and analysis/monitoring
is badly needed.
I think for OpenVPN I will stick with a simple script on /var/log/openvpn.log - maybe
a bit of python. OpenVPN might be running when FreeNAS is down, so I'd rather
have this simple bit of monitoring locally.