<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remote logging targets and ISE in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/remote-logging-targets-and-ise/m-p/4734121#M578694</link>
    <description>&lt;P&gt;&lt;FONT face="helvetica"&gt;Hi Experts,&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="helvetica"&gt;The remote logging targets has been configured and required logging categories are assigned to this remote logging target.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="helvetica"&gt;For which ISE node is the syslog port needs to be opened on firewall? Its going to be port UDP/514 for MnT or PAN?&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="helvetica"&gt;Since, this is a fully distributed deployment need some kind of confirmation on the approach.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="helvetica"&gt;Any pointers will be helpful.&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Dec 2022 15:04:59 GMT</pubDate>
    <dc:creator>dgaikwad</dc:creator>
    <dc:date>2022-12-07T15:04:59Z</dc:date>
    <item>
      <title>Remote logging targets and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-logging-targets-and-ise/m-p/4734121#M578694</link>
      <description>&lt;P&gt;&lt;FONT face="helvetica"&gt;Hi Experts,&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="helvetica"&gt;The remote logging targets has been configured and required logging categories are assigned to this remote logging target.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="helvetica"&gt;For which ISE node is the syslog port needs to be opened on firewall? Its going to be port UDP/514 for MnT or PAN?&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="helvetica"&gt;Since, this is a fully distributed deployment need some kind of confirmation on the approach.&lt;/FONT&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;FONT face="helvetica"&gt;Any pointers will be helpful.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 15:04:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-logging-targets-and-ise/m-p/4734121#M578694</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2022-12-07T15:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: Remote logging targets and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-logging-targets-and-ise/m-p/4734207#M578699</link>
      <description>&lt;P&gt;If you looking to send all logs to syslog, i would add all nodes IP in Firewall to allow syslog port you configured on each device to send logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Dec 2022 17:21:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-logging-targets-and-ise/m-p/4734207#M578699</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2022-12-07T17:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: Remote logging targets and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-logging-targets-and-ise/m-p/4734659#M578714</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/224506"&gt;@dgaikwad&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;You need to allow all ISE nodes to send syslog messages. You can see that in &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/2-3/install_guide/b_ise_InstallationGuide23/b_ise_InstallationGuide23_chapter_0110.pdf" target="_self"&gt;Cisco ISE Port Reference&lt;/A&gt;. You can &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/ise/3-2/admin_guide/b_ise_admin_3_2/b_ISE_admin_32_deployment.html#reference_24E777B290D24A7C981CAAD82F889CA3" target="_self"&gt;configure&lt;/A&gt; port and protocol when defining Remote Logging Target (by default it is UDP/514).&lt;/P&gt;
&lt;P&gt;Kind regards,&lt;/P&gt;
&lt;P&gt;Milos&lt;/P&gt;</description>
      <pubDate>Thu, 08 Dec 2022 08:26:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-logging-targets-and-ise/m-p/4734659#M578714</guid>
      <dc:creator>Milos_Jovanovic</dc:creator>
      <dc:date>2022-12-08T08:26:49Z</dc:date>
    </item>
    <item>
      <title>Re: Remote logging targets and ISE</title>
      <link>https://community.cisco.com/t5/network-access-control/remote-logging-targets-and-ise/m-p/4739569#M578839</link>
      <description>&lt;P&gt;&lt;FONT face="helvetica" color="#003366"&gt;Yes, this configuration makes sense, the ports document shows the same.&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="helvetica" color="#003366"&gt;As per design all the nodes are sending syslog individually to MnT nodes, thus if the same copy us to be sent to external remote logging target then the ports for all the nodes are to be allowed to syslog server.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2022 10:20:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/remote-logging-targets-and-ise/m-p/4739569#M578839</guid>
      <dc:creator>dgaikwad</dc:creator>
      <dc:date>2022-12-15T10:20:57Z</dc:date>
    </item>
  </channel>
</rss>

