<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: impact of ASA debugging level logging in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/4700773#M1094110</link>
    <description>&lt;P&gt;I was looking at this same issue for one of my customers and was surprised to find that MSSPs are telling customers that this is a safe practice.&amp;nbsp; In my experience with Unix/Linux systems I have always seen guidance to use debug level commands judiciously.&amp;nbsp; Now specific to ASA the guidance is also clear:&lt;/P&gt;
&lt;P class="p1"&gt;Usage Guidelines&lt;/P&gt;
&lt;P class="p1"&gt;Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.&lt;/P&gt;
&lt;P class="p1"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-cli-reference/A-H/asa-command-ref-A-H/m_da-dg.html#wp3591254020" target="_blank"&gt;ASA command reference - debug&lt;/A&gt;&lt;/P&gt;
&lt;P class="p1"&gt;configuration guide for ASA: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa914/configuration/general/asa-914-general-config/admin-trouble.html#ID-2109-00000007" target="_blank"&gt;&lt;SPAN class="s1"&gt;View debugging messages&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 10 Oct 2022 15:11:23 GMT</pubDate>
    <dc:creator>Henry Pinera</dc:creator>
    <dc:date>2022-10-10T15:11:23Z</dc:date>
    <item>
      <title>impact of ASA debugging level logging</title>
      <link>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/1805673#M496450</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does running an ASA at debugging level logging 100% of the time impact CPU and or Memory? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are there recommendations from cisco about not doing this? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are having a discussion about ASA debugging level logging versus doing the same on routers. Of course you don't do that on routers except when absolutely needed, but the question is: can you do it on ASAs without impact.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:34:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/1805673#M496450</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2019-03-11T21:34:13Z</dc:date>
    </item>
    <item>
      <title>impact of ASA debugging level logging</title>
      <link>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/1805674#M496451</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Icaruso,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Debugging level is only to be used for troubleshooting purpose because yes, it affects the memory and CPU of the ASA. If you already have high amount of traffic passing through the ASA then debugging level would definitely be an overload on the ASA. You should use a syslog server with informational or notificational level logging. Whenever you want to troubleshoot anything on the ASA, you can turn on debugging level and after that you shoudl turn it off.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Oct 2011 01:43:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/1805674#M496451</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-06T01:43:37Z</dc:date>
    </item>
    <item>
      <title>impact of ASA debugging level logging</title>
      <link>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/1805675#M496454</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Sorry if this was vauge. I've dealt with cisco products since the mid 1990's, so I'm fully cognizant of the significance of debugging impact in general and the common sense tradition of when it is to be employed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the real issue:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are dealing with a well known MSSP who claims they need all of a client's ASA's turned up to debugging level for their logging analysis. We didn't think it was necessary. They claim it doesn't impact cpu and memory signigicantly and they are doing this on thousands of ASAs. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;While I agree that an already loaded device is not going to do well with debugging level logging, I'm looking for a more rigourous response from cisco is one can be had. Is there any more information that can be disclosed, for example, about how busy an ASA would need to be in order for debugging level logging to be a operational issue?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's really what I'm trying to get at here. Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Oct 2011 17:58:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/1805675#M496454</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-10-10T17:58:48Z</dc:date>
    </item>
    <item>
      <title>impact of ASA debugging level logging</title>
      <link>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/1805676#M496459</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can someone from cisco please comment on this further? Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;We are dealing with a well known MSSP who claims they need all of a&amp;nbsp; client's ASA's turned up to debugging level for their logging analysis.&amp;nbsp; We didn't think it was necessary. They claim it doesn't impact cpu and&amp;nbsp; memory signigicantly and they are doing this on thousands of ASAs. &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;While&amp;nbsp; I agree that an already loaded device is not going to do well with&amp;nbsp; debugging level logging, I'm looking for a more rigourous response from&amp;nbsp; cisco is one can be had. Is there any more information that can be&amp;nbsp; disclosed, for example, about how busy an ASA would need to be in order&amp;nbsp; for debugging level logging to be a operational issue?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;That's really what I'm trying to get at here. Thanks.&lt;/EM&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Oct 2011 15:23:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/1805676#M496459</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-10-14T15:23:29Z</dc:date>
    </item>
    <item>
      <title>Re: impact of ASA debugging level logging</title>
      <link>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/1805677#M496464</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="margin-top: px; margin-bottom: px;"&gt;Logging debugs to a syslog server is better than logging debugs to the ASA.&amp;nbsp; All would agree that logging debugs is not normal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin-top: px; margin-bottom: px;"&gt;Here are rules of thumb to follow when choosing a severity level:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-top: px; margin-bottom: px;"&gt;If only firewall error conditions should be recorded and no one will regularly view the message logs, choose severity level 3 (errors).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-top: px; margin-bottom: px;"&gt;If you are primarily interested in seeing how traffic is being filtered by the firewall access lists, choose severity level 4 (warnings).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-top: px; margin-bottom: px;"&gt;If you need an audit trail of firewall users and their activity, choose severity level 5 (notifications).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-top: px; margin-bottom: px;"&gt;If you will be using a firewall log analysis application, you should choose severity level 6 (informational). This is the only level that produces&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; messages about connections that are created, as well as the time and data volume usage.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI style="margin-top: px; margin-bottom: px;"&gt;If you need to use any &lt;STRONG&gt;debug&lt;/STRONG&gt; command to troubleshoot something on the firewall, choose a destination with severity level 7 (debugging). You can use the &lt;STRONG&gt;logging debug-trace &lt;/STRONG&gt;command to force debug output to be sent to a logging destination for later review. All Syslog messages&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; containing debug output use message ID 711001 at a default severity level of 7.&lt;/LI&gt;&lt;/UL&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Oct 2011 18:04:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/1805677#M496464</guid>
      <dc:creator>lcaruso</dc:creator>
      <dc:date>2011-10-14T18:04:30Z</dc:date>
    </item>
    <item>
      <title>Re: impact of ASA debugging level logging</title>
      <link>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/4700773#M1094110</link>
      <description>&lt;P&gt;I was looking at this same issue for one of my customers and was surprised to find that MSSPs are telling customers that this is a safe practice.&amp;nbsp; In my experience with Unix/Linux systems I have always seen guidance to use debug level commands judiciously.&amp;nbsp; Now specific to ASA the guidance is also clear:&lt;/P&gt;
&lt;P class="p1"&gt;Usage Guidelines&lt;/P&gt;
&lt;P class="p1"&gt;Because debugging output is assigned high priority in the CPU process, it can render the system unusable. For this reason, use debug commands only to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff. Moreover, it is best to use debug commands during periods of lower network traffic and fewer users. Debugging during these periods decreases the likelihood that increased debug command processing overhead will affect system use.&lt;/P&gt;
&lt;P class="p1"&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa-cli-reference/A-H/asa-command-ref-A-H/m_da-dg.html#wp3591254020" target="_blank"&gt;ASA command reference - debug&lt;/A&gt;&lt;/P&gt;
&lt;P class="p1"&gt;configuration guide for ASA: &lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/asa914/configuration/general/asa-914-general-config/admin-trouble.html#ID-2109-00000007" target="_blank"&gt;&lt;SPAN class="s1"&gt;View debugging messages&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 10 Oct 2022 15:11:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/4700773#M1094110</guid>
      <dc:creator>Henry Pinera</dc:creator>
      <dc:date>2022-10-10T15:11:23Z</dc:date>
    </item>
    <item>
      <title>Re: impact of ASA debugging level logging</title>
      <link>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/4701157#M1094136</link>
      <description>&lt;P&gt;if your costumer need that we can at least make reduce log message ASA send, for example&amp;nbsp;&lt;BR /&gt;when your traffic hit ACL line it generate Log message, but if traffic hit again same ACL line the Log message will not generate, the ASA wait some time before regenerate log for same traffic hit same ACL line.&amp;nbsp;&lt;BR /&gt;I know this will not make huge different but It will help you at least for little to reduce CPU utilize.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.globalknowledge.com/ca-en/resources/resource-library/articles/asa-acl-logging/" target="_blank"&gt;https://www.globalknowledge.com/ca-en/resources/resource-library/articles/asa-acl-logging/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Oct 2022 09:42:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/impact-of-asa-debugging-level-logging/m-p/4701157#M1094136</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-10-11T09:42:59Z</dc:date>
    </item>
  </channel>
</rss>

