<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Is it still relevant to send switch syslogs to ISE 2.x/3.x? in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/is-it-still-relevant-to-send-switch-syslogs-to-ise-2-x-3-x/m-p/4680042#M577070</link>
    <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;I understand that your question is related to "benefits", but I would like to add that:&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN&gt;" &lt;EM&gt;... As a &lt;U&gt;best practice&lt;/U&gt;, do NOT configure &lt;STRONG&gt;Network Devices&lt;/STRONG&gt; to send &lt;STRONG&gt;Syslogs&lt;/STRONG&gt; to a &lt;STRONG&gt;Cisco ISE Monitoring and Troubleshooting (MnT) Node&lt;/STRONG&gt; as this could result in the &lt;U&gt;loss&lt;/U&gt; of some &lt;STRONG&gt;Network Access Device (NAD) Syslogs&lt;/STRONG&gt;, and &lt;U&gt;overloads&lt;/U&gt; the &lt;STRONG&gt;MnT Servers&lt;/STRONG&gt; resulting in &lt;U&gt;loading issues&lt;/U&gt;...&lt;/EM&gt; " (please take a look at &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-7/admin_guide/b_ise_27_admin_guide/b_ISE_admin_27_maintain_monitor.html" target="_blank" rel="noopener"&gt;ISE Administration Guide&lt;/A&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN&gt;Hope this helps !!!&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 01 Sep 2022 23:58:29 GMT</pubDate>
    <dc:creator>Marcelo Morais</dc:creator>
    <dc:date>2022-09-01T23:58:29Z</dc:date>
    <item>
      <title>Is it still relevant to send switch syslogs to ISE 2.x/3.x?</title>
      <link>https://community.cisco.com/t5/network-access-control/is-it-still-relevant-to-send-switch-syslogs-to-ise-2-x-3-x/m-p/4678965#M577015</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Anyone know exactly what the benefit was of configuring a Cisco switch to send the switch SYSLOGs to ISE?&lt;/P&gt;
&lt;P&gt;I see it mentioned in older documentation and blogs:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="logging.PNG" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/161188i28AEF21F872E85F2/image-size/large?v=v2&amp;amp;px=999" role="button" title="logging.PNG" alt="logging.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;What did ISE do with those SYSLOGs? Does this add any information to the LiveLogs, or Endpoint debugs etc.?&lt;/P&gt;
&lt;P&gt;Is there any benefit in sending SYSLOGs to ISE 2.x/3.x ?&lt;/P&gt;
&lt;P&gt;regards&lt;/P&gt;
&lt;P&gt;Arne&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 00:23:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/is-it-still-relevant-to-send-switch-syslogs-to-ise-2-x-3-x/m-p/4678965#M577015</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-08-31T00:23:01Z</dc:date>
    </item>
    <item>
      <title>Re: Is it still relevant to send switch syslogs to ISE 2.x/3.x?</title>
      <link>https://community.cisco.com/t5/network-access-control/is-it-still-relevant-to-send-switch-syslogs-to-ise-2-x-3-x/m-p/4680027#M577067</link>
      <description>&lt;P&gt;Sending switch syslog to ISE was only ever to aid in troubleshooting. I think the consumed syslog data would supplement some of the reports or troubleshooting tools, but I never really found it useful. The only real detail I can find is in the old 2.1 'TrustSec How-To Guide' that I still have saved.&lt;/P&gt;
&lt;DIV class="page" title="Page 9"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;P&gt;&lt;SPAN&gt;Syslog may be generated on Cisco IOS® Software in many events. Some of the syslog messages can be sent to Cisco ISE to be used for troubleshooting. &lt;BR /&gt;...&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV class="page" title="Page 9"&gt;
&lt;DIV class="layoutArea"&gt;
&lt;DIV class="column"&gt;
&lt;P&gt;&lt;SPAN&gt;Set up standard logging functions on the switch to support possible troubleshooting / recording for Cisco ISE functions. The Enforcement Policy Module (EPM) is a part of the Cisco IOS Software responsible for features such as web authentication and downloadable ACL.&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN&gt;Enabling EPM logging generates a syslog related to downloadable ACL authorization, and part of the log can be correlated inside Cisco ISE when such logs are sent to Cisco ISE.&lt;BR /&gt;...&lt;BR /&gt;Only the following NAD syslog messages are actually collected and used by Cisco ISE:&lt;BR /&gt;- AP-6-AUTH_PROXY_AUDIT_START&lt;BR /&gt;- AP-6-AUTH_PROXY_AUDIT_STOP&lt;BR /&gt;- AP-1-AUTH_PROXY_DOS_ATTACK&lt;BR /&gt;- AP-1-AUTH_PROXY_RETRIES_EXCEEDED&lt;BR /&gt;- AP-1-AUTH_PROXY_FALLBACK_REQ&lt;BR /&gt;- AP-1-AUTH_PROXY_AAA_DOWN&lt;BR /&gt;- AUTHMGR-5-MACMOVE&lt;BR /&gt;- AUTHMGR-5-MACREPLACE&lt;BR /&gt;- MKA-5-SESSION_START&lt;BR /&gt;- MKA-5-SESSION_STOP&lt;BR /&gt;- MKA-5-SESSION_REAUTH&lt;BR /&gt;- MKA-5-SESSION_UNSECURED&lt;BR /&gt;- MKA-5-SESSION_SECURED&lt;BR /&gt;- MKA-5-KEEPALIVE_TIMEOUT&lt;BR /&gt;- DOT1X-5-SUCCESS / FAIL&lt;BR /&gt;- MAB-5-SUCCESS / FAIL&lt;BR /&gt;- AUTHMGR-5-START / SUCCESS / FAIL&lt;BR /&gt;- AUTHMGR-SP-5-VLANASSIGN / VLANASSIGNERR&lt;BR /&gt;- EPM-6-POLICY_REQ&lt;BR /&gt;- EPM-6-POLICY_APP_SUCCESS / FAILURE&lt;BR /&gt;- EPM-6-IPEVENT:&lt;BR /&gt;- DOT1X_SWITCH-5-ERR_VLAN_NOT_FOUND&lt;BR /&gt;- RADIUS-4-RADIUS_DEAD&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 01 Sep 2022 22:43:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/is-it-still-relevant-to-send-switch-syslogs-to-ise-2-x-3-x/m-p/4680027#M577067</guid>
      <dc:creator>Greg Gibbs</dc:creator>
      <dc:date>2022-09-01T22:43:05Z</dc:date>
    </item>
    <item>
      <title>Re: Is it still relevant to send switch syslogs to ISE 2.x/3.x?</title>
      <link>https://community.cisco.com/t5/network-access-control/is-it-still-relevant-to-send-switch-syslogs-to-ise-2-x-3-x/m-p/4680042#M577070</link>
      <description>&lt;P class="lia-align-justify"&gt;Hi&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/158532"&gt;@Arne Bier&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;I understand that your question is related to "benefits", but I would like to add that:&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN&gt;" &lt;EM&gt;... As a &lt;U&gt;best practice&lt;/U&gt;, do NOT configure &lt;STRONG&gt;Network Devices&lt;/STRONG&gt; to send &lt;STRONG&gt;Syslogs&lt;/STRONG&gt; to a &lt;STRONG&gt;Cisco ISE Monitoring and Troubleshooting (MnT) Node&lt;/STRONG&gt; as this could result in the &lt;U&gt;loss&lt;/U&gt; of some &lt;STRONG&gt;Network Access Device (NAD) Syslogs&lt;/STRONG&gt;, and &lt;U&gt;overloads&lt;/U&gt; the &lt;STRONG&gt;MnT Servers&lt;/STRONG&gt; resulting in &lt;U&gt;loading issues&lt;/U&gt;...&lt;/EM&gt; " (please take a look at &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-7/admin_guide/b_ise_27_admin_guide/b_ISE_admin_27_maintain_monitor.html" target="_blank" rel="noopener"&gt;ISE Administration Guide&lt;/A&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="lia-align-justify"&gt;&lt;SPAN&gt;Hope this helps !!!&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Sep 2022 23:58:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/is-it-still-relevant-to-send-switch-syslogs-to-ise-2-x-3-x/m-p/4680042#M577070</guid>
      <dc:creator>Marcelo Morais</dc:creator>
      <dc:date>2022-09-01T23:58:29Z</dc:date>
    </item>
    <item>
      <title>Re: Is it still relevant to send switch syslogs to ISE 2.x/3.x?</title>
      <link>https://community.cisco.com/t5/network-access-control/is-it-still-relevant-to-send-switch-syslogs-to-ise-2-x-3-x/m-p/4680050#M577073</link>
      <description>&lt;P&gt;thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/388087"&gt;@Greg Gibbs&lt;/a&gt;&amp;nbsp;- those events look quite useful to be honest. But if they are buried somewhere in text file logs (and not enhancing the Web UI user experience) then it's probably not worth bothering with.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Sep 2022 00:33:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/is-it-still-relevant-to-send-switch-syslogs-to-ise-2-x-3-x/m-p/4680050#M577073</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-09-02T00:33:57Z</dc:date>
    </item>
    <item>
      <title>Re: Is it still relevant to send switch syslogs to ISE 2.x/3.x?</title>
      <link>https://community.cisco.com/t5/network-access-control/is-it-still-relevant-to-send-switch-syslogs-to-ise-2-x-3-x/m-p/4680051#M577074</link>
      <description>&lt;P&gt;thanks&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/17232"&gt;@Marcelo Morais&lt;/a&gt;&amp;nbsp;- when they use words like "could result" then I am still none the wiser.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;and if you read further below, the guide contradicts itself&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#3366FF"&gt;&lt;SPAN&gt;If the Monitoring node is configured as the syslog server for a network device, &lt;STRONG&gt;&lt;EM&gt;ensure that the&lt;/EM&gt;&lt;/STRONG&gt; logging source sends the correct network access server (NAS) IP address in the following format:&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="p"&gt;&lt;FONT color="#3366FF"&gt;&lt;EM class="ph i"&gt;&amp;lt;message_number&amp;gt;sequence_number: NAS_IP_address: timestamp: syslog_type: &amp;lt;message_text&amp;gt;&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="p"&gt;&lt;FONT color="#3366FF"&gt;Otherwise, this might impact functionalities that depend on the NAS IP address.&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="p"&gt;It's probably safe to say that nobody should do this because it's a legacy feature and the world was a different place when ISE 1.x was around.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Sep 2022 00:41:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/is-it-still-relevant-to-send-switch-syslogs-to-ise-2-x-3-x/m-p/4680051#M577074</guid>
      <dc:creator>Arne Bier</dc:creator>
      <dc:date>2022-09-02T00:41:11Z</dc:date>
    </item>
  </channel>
</rss>

