<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Audit pix v7 access rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/audit-pix-v7-access-rules/m-p/701109#M1034067</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The best tool for you is "Firewall Analyzer". You can get the software from &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://manageengine.adventnet.com/products/firewall/download.html" target="_blank"&gt;http://manageengine.adventnet.com/products/firewall/download.html&lt;/A&gt;. It is a free 30 day trial period. &lt;/P&gt;&lt;P&gt;On the pix you just have to add it like anyother syslog server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging host inside &lt;IP&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will get all kinds of reports like the rule that is more used, protocol graph etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Pls rate if useful--&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 22 Nov 2006 18:06:58 GMT</pubDate>
    <dc:creator>zubairjalal</dc:creator>
    <dc:date>2006-11-22T18:06:58Z</dc:date>
    <item>
      <title>Audit pix v7 access rules</title>
      <link>https://community.cisco.com/t5/network-security/audit-pix-v7-access-rules/m-p/701108#M1034066</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i am in charge of auditing access rules on a PIX V7 with 11 interfaces including 5 logicals one, it seems that we have 570 rules with a lot of hosts/groups and we want to know better which traffic is allowed on the pix.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can somebody suggest me a tool or software to audit my access rule to do that because with ASDM or CLI i can filter as i want&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 08:59:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-pix-v7-access-rules/m-p/701108#M1034066</guid>
      <dc:creator>yann.boulet</dc:creator>
      <dc:date>2019-03-11T08:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: Audit pix v7 access rules</title>
      <link>https://community.cisco.com/t5/network-security/audit-pix-v7-access-rules/m-p/701109#M1034067</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The best tool for you is "Firewall Analyzer". You can get the software from &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://manageengine.adventnet.com/products/firewall/download.html" target="_blank"&gt;http://manageengine.adventnet.com/products/firewall/download.html&lt;/A&gt;. It is a free 30 day trial period. &lt;/P&gt;&lt;P&gt;On the pix you just have to add it like anyother syslog server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging host inside &lt;IP&gt;&lt;/IP&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You will get all kinds of reports like the rule that is more used, protocol graph etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--Pls rate if useful--&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 22 Nov 2006 18:06:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-pix-v7-access-rules/m-p/701109#M1034067</guid>
      <dc:creator>zubairjalal</dc:creator>
      <dc:date>2006-11-22T18:06:58Z</dc:date>
    </item>
    <item>
      <title>Re: Audit pix v7 access rules</title>
      <link>https://community.cisco.com/t5/network-security/audit-pix-v7-access-rules/m-p/701110#M1034068</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Many thanks for your reply, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i think this software will help me day after day but what i really want is to know if rules aren't too old. I want to know what kind of rules are on my pix, who is allowed to do what. my real trouble is that some destinations are reachable by ip source that i want to deny and if my ip source is created in an asdm group i can't find it easily with rules displayed on asdm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 23 Nov 2006 18:25:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-pix-v7-access-rules/m-p/701110#M1034068</guid>
      <dc:creator>yann.boulet</dc:creator>
      <dc:date>2006-11-23T18:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: Audit pix v7 access rules</title>
      <link>https://community.cisco.com/t5/network-security/audit-pix-v7-access-rules/m-p/701111#M1034069</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Anyone to reply ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I try to use Cisco security manager v3 and it seems that it can be a good software for my job but i can't extract or filter any rules to purge it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thx&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 28 Nov 2006 12:40:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-pix-v7-access-rules/m-p/701111#M1034069</guid>
      <dc:creator>yann.boulet</dc:creator>
      <dc:date>2006-11-28T12:40:59Z</dc:date>
    </item>
  </channel>
</rss>

