<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Logging in Firepower in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/logging-in-firepower/m-p/4036813#M1067077</link>
    <description>&lt;P&gt;Query the connection events in FMC (or FDM) is one way.&lt;/P&gt;
&lt;P&gt;Another is to watch firewall-engine debug from the cli while the client attempts to establish the connection.&lt;/P&gt;
&lt;P&gt;A third is to run packet-tracer.&lt;/P&gt;
&lt;P&gt;A fourth is to do packet-capture.&lt;/P&gt;</description>
    <pubDate>Thu, 27 Feb 2020 11:36:24 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2020-02-27T11:36:24Z</dc:date>
    <item>
      <title>Logging in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/logging-in-firepower/m-p/4036747#M1067062</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am just wondering what other guys are doing, working with Firepower, when they quickly want to log a blocked request from a client? Similar to the ASDM logging windows we have with the ASA firewalls, there where we can simply add the IP address we want to log into the search field and then getting the blocked event (for example because a port is not correct or any other reason). Done within 30 seconds.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What is a pragmatical approach to log such as request without the need of seeting up syslog, syslog servers etc.? Just to log a simple request?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks all of you&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 09:08:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-in-firepower/m-p/4036747#M1067062</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-02-27T09:08:43Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/logging-in-firepower/m-p/4036813#M1067077</link>
      <description>&lt;P&gt;Query the connection events in FMC (or FDM) is one way.&lt;/P&gt;
&lt;P&gt;Another is to watch firewall-engine debug from the cli while the client attempts to establish the connection.&lt;/P&gt;
&lt;P&gt;A third is to run packet-tracer.&lt;/P&gt;
&lt;P&gt;A fourth is to do packet-capture.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 11:36:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-in-firepower/m-p/4036813#M1067077</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-02-27T11:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/logging-in-firepower/m-p/4036859#M1067090</link>
      <description>&lt;P&gt;Hi Marvin&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for this quick answer. The command&amp;nbsp;system support firewall-engine-debug is a great one, really straight forward. Do you have somehow a link which describes your two other options with the packet tracer and packet capture a bit closer?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 12:55:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-in-firepower/m-p/4036859#M1067090</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-02-27T12:55:05Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/logging-in-firepower/m-p/4036989#M1067095</link>
      <description>&lt;P&gt;I recommend&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/339519"&gt;@Nazmul Rajib&lt;/a&gt;'s book on Firepower Threat Defense. It has lots of detailed examples on using FTD's packet-tracer and packet-capture commands.&lt;/P&gt;
&lt;P&gt;It's available via the usual venues - I use Safari/O'Reilly as part of my ACM membership to access it.&lt;/P&gt;
&lt;P&gt;You could also check out Cisco Live presentation&amp;nbsp;BRKSEC-3455 Dissecting FTD Architecture and Troubleshooting which can be downloaded for free.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Feb 2020 16:23:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-in-firepower/m-p/4036989#M1067095</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2020-02-27T16:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: Logging in Firepower</title>
      <link>https://community.cisco.com/t5/network-security/logging-in-firepower/m-p/4037374#M1067117</link>
      <description>&lt;P&gt;Thank you Marvin for your inputs. Very helpful&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2020 08:56:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-in-firepower/m-p/4037374#M1067117</guid>
      <dc:creator>markus.albisser1</dc:creator>
      <dc:date>2020-02-28T08:56:07Z</dc:date>
    </item>
  </channel>
</rss>

