<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/log/m-p/771665#M1020878</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rick i have a query,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is syslog will generate only deny logs bydefault?..In order to receive all type of(what ever the connections establishing and denied logs also) what are the config setting we have to do in Pix?..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 17 Aug 2007 06:30:46 GMT</pubDate>
    <dc:creator>sureshkum</dc:creator>
    <dc:date>2007-08-17T06:30:46Z</dc:date>
    <item>
      <title>Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771658#M1020869</link>
      <description>&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;access-list branch-policy line 43 permit tcp 172.16.0.0 255.240.0.0 host 172.30.2.140 eq 445 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is my ACL.But i wanted to know which are all systems are connecting to 172.30.2.140.the broblem is if the source systems are connecting always to 172.30.2.140 means i could find trou sh conn command rite, But they are connecting occasionally.hence i m getting hit counts in that particular ACL.So could please share with me, How could i find the Connecting source ip address.Please help me..Thanks in advance&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 10:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771658#M1020869</guid>
      <dc:creator>sureshkum</dc:creator>
      <dc:date>2019-03-11T10:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771659#M1020870</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;enable syslogging for the traffic and log all the traffic matching that ACL to syslog server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;~Rohit&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 09:17:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771659#M1020870</guid>
      <dc:creator>rochopra</dc:creator>
      <dc:date>2007-08-14T09:17:02Z</dc:date>
    </item>
    <item>
      <title>Re: Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771660#M1020871</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks a lot for ur response.I have added already.But unable to find any entry related to 445 port for that corresponding source and destination.I m getting only denied logs.but it should come under permit log i think so.my syslog trap level is notification.What i have to do further?.Please..Acl in given below &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list branch-policy line 43 permit tcp 172.16.0.0 255.240.0.0 host 172.30.2.140 eq 445 log 6 interval 300 (hitcnt=106) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 09:20:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771660#M1020871</guid>
      <dc:creator>sureshkum</dc:creator>
      <dc:date>2007-08-14T09:20:18Z</dc:date>
    </item>
    <item>
      <title>Re: Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771661#M1020872</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That traffic is coming from a branch office through the Internet unencrypted?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Aug 2007 12:11:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771661#M1020872</guid>
      <dc:creator>rigoberto.cintron</dc:creator>
      <dc:date>2007-08-14T12:11:33Z</dc:date>
    </item>
    <item>
      <title>Re: Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771662#M1020874</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sorry for delay reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;No.Its coming through leased line..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 06:38:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771662#M1020874</guid>
      <dc:creator>sureshkum</dc:creator>
      <dc:date>2007-08-16T06:38:36Z</dc:date>
    </item>
    <item>
      <title>Re: Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771663#M1020876</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;sureshkumar &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;from your previous post: my syslog trap level is notification. I believe that the logging level for access lists is informational. Change the trap level to informational and let us know what happens.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Aug 2007 13:21:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771663#M1020876</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2007-08-16T13:21:19Z</dc:date>
    </item>
    <item>
      <title>Re: Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771664#M1020877</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi rick,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks a lot..Found the logs..thanks a log&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2007 06:24:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771664#M1020877</guid>
      <dc:creator>sureshkum</dc:creator>
      <dc:date>2007-08-17T06:24:28Z</dc:date>
    </item>
    <item>
      <title>Re: Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771665#M1020878</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Rick i have a query,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is syslog will generate only deny logs bydefault?..In order to receive all type of(what ever the connections establishing and denied logs also) what are the config setting we have to do in Pix?..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2007 06:30:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771665#M1020878</guid>
      <dc:creator>sureshkum</dc:creator>
      <dc:date>2007-08-17T06:30:46Z</dc:date>
    </item>
    <item>
      <title>Re: Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771666#M1020879</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Sureshkumar&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have already answered this question in VPN security forum for you. You need to set your syslog trap level to informational. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you leave your trap level as notification you will not see the permits. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2007 07:41:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771666#M1020879</guid>
      <dc:creator>Jon Marshall</dc:creator>
      <dc:date>2007-08-17T07:41:45Z</dc:date>
    </item>
    <item>
      <title>Re: Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771667#M1020880</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry jon, that day i thought wrongly that my logging level is informational.Today i justifyed.&lt;/P&gt;&lt;P&gt;i have one more query in above post.kndly reply me&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2007 08:26:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771667#M1020880</guid>
      <dc:creator>sureshkum</dc:creator>
      <dc:date>2007-08-17T08:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771668#M1020882</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sureshkumar &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe that your question is: Is syslog will generate only deny logs by default?&lt;/P&gt;&lt;P&gt;The answer to that is no it is not default to generate logs only for deny. It will generate logs for any ACL statement that includes the log keyword. So if you have permit statements including the log keyword then you should see the permitted packets in your log messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 17 Aug 2007 09:36:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771668#M1020882</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2007-08-17T09:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: Log</title>
      <link>https://community.cisco.com/t5/network-security/log/m-p/771669#M1020884</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 18 Aug 2007 09:47:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/log/m-p/771669#M1020884</guid>
      <dc:creator>sureshkum</dc:creator>
      <dc:date>2007-08-18T09:47:59Z</dc:date>
    </item>
  </channel>
</rss>

