<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Filter out a specific ACL traffic within ACL access-group in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/filter-out-a-specific-acl-traffic-within-acl-access-group/m-p/4777322#M1097888</link>
    <description>&lt;P&gt;best way I think.&amp;nbsp;&lt;BR /&gt;using Log only for permit ip any any&amp;nbsp;&lt;BR /&gt;then monitor for few days&amp;nbsp;&lt;BR /&gt;after that&amp;nbsp;&lt;BR /&gt;change it with permit ip x.x.x.x y.y.y.y&lt;/P&gt;</description>
    <pubDate>Fri, 17 Feb 2023 09:37:16 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-02-17T09:37:16Z</dc:date>
    <item>
      <title>Filter out a specific ACL traffic within ACL access-group</title>
      <link>https://community.cisco.com/t5/network-security/filter-out-a-specific-acl-traffic-within-acl-access-group/m-p/4777313#M1097887</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;So.. i have an ACL with a number of rules &amp;lt;30 defined on an ASA running 9.12.4x&lt;/P&gt;&lt;P&gt;the last ACL in this rulebase is an 'ip any any' allow and i want to remove and tighten this up.. but i first need to determine what traffic is allowed on this rule.&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;access-list dmz_acl extended permit ip any 10.4.4.0 255.255.255.0&lt;BR /&gt;access-list dmz_acl extended permit tcp 10.13.133.0 255.255.255.0 host 10.4.1.151 eq 2598&lt;BR /&gt;access-list dmz_acl extended permit ip any 172.16.254.0 255.255.255.0&lt;BR /&gt;access-list dmz_acl extended permit ip 10.3.4.0 255.255.0.0 host 10.4.0.200&lt;BR /&gt;access-list dmz_acl extended permit ip any any log&lt;/P&gt;&lt;P&gt;is there a way to capture &lt;STRONG&gt;only&lt;/STRONG&gt; logs hitting the last acl with 'ip any any' rule to export and analyze?&lt;/P&gt;&lt;P&gt;the only option i can think perhaps is to add a 'log disable' on all preceding ACLs except for 'ip any any' and run it for a few days and capture this on our log server..&lt;/P&gt;&lt;P&gt;any other ideas/methods?&lt;/P&gt;&lt;P&gt;thanks in adv&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 09:28:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filter-out-a-specific-acl-traffic-within-acl-access-group/m-p/4777313#M1097887</guid>
      <dc:creator>ants_sec</dc:creator>
      <dc:date>2023-02-17T09:28:05Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out a specific ACL traffic within ACL access-group</title>
      <link>https://community.cisco.com/t5/network-security/filter-out-a-specific-acl-traffic-within-acl-access-group/m-p/4777322#M1097888</link>
      <description>&lt;P&gt;best way I think.&amp;nbsp;&lt;BR /&gt;using Log only for permit ip any any&amp;nbsp;&lt;BR /&gt;then monitor for few days&amp;nbsp;&lt;BR /&gt;after that&amp;nbsp;&lt;BR /&gt;change it with permit ip x.x.x.x y.y.y.y&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 09:37:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filter-out-a-specific-acl-traffic-within-acl-access-group/m-p/4777322#M1097888</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-02-17T09:37:16Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out a specific ACL traffic within ACL access-group</title>
      <link>https://community.cisco.com/t5/network-security/filter-out-a-specific-acl-traffic-within-acl-access-group/m-p/4777327#M1097891</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1320332"&gt;@ants_sec&lt;/a&gt; with the keyword &lt;STRONG&gt;log&lt;/STRONG&gt; appended to the ACE (which is only your last rule), this generates the syslog message 106100. So you could send those specific logs to a syslog server.&lt;/P&gt;
&lt;P&gt;Example:&lt;/P&gt;
&lt;P&gt;logging host INSIDE 192.168.10.15 tcp/1514&lt;BR /&gt;logging list SEND-TO-SYSLOG message 106100&lt;BR /&gt;logging trap SEND-TO-SYSLOG&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 09:46:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filter-out-a-specific-acl-traffic-within-acl-access-group/m-p/4777327#M1097891</guid>
      <dc:creator>Rob Ingram</dc:creator>
      <dc:date>2023-02-17T09:46:43Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out a specific ACL traffic within ACL access-group</title>
      <link>https://community.cisco.com/t5/network-security/filter-out-a-specific-acl-traffic-within-acl-access-group/m-p/4777328#M1097892</link>
      <description>&lt;P&gt;will do the log only for the ip any any option for a few days&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for the prompt response. appreciated.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2023 09:52:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filter-out-a-specific-acl-traffic-within-acl-access-group/m-p/4777328#M1097892</guid>
      <dc:creator>ants_sec</dc:creator>
      <dc:date>2023-02-17T09:52:19Z</dc:date>
    </item>
    <item>
      <title>Re: Filter out a specific ACL traffic within ACL access-group</title>
      <link>https://community.cisco.com/t5/network-security/filter-out-a-specific-acl-traffic-within-acl-access-group/m-p/4781855#M1098133</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;thought i'd post this as i found a much easier solution to my issue...&lt;/P&gt;&lt;P&gt;each acl/ace has a unique HEX identifier.. so the simple method is to search the logs based on this identifier. in my case all logs are sent to a syslog server, and i can happily search based on the ACL name and the hex id of the rule.. and that way get all the logs passing over a specific rule within the rulebase..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;example:&lt;/P&gt;&lt;P&gt;sho&amp;nbsp; access-list wan_acl&lt;/P&gt;&lt;P&gt;access-list wan_acl line 33 extended permit ..................range 3200 3299 (hitcnt=1) 0xb866edc2&lt;BR /&gt;access-list wan_acl line 33 extended permit tcp .................. range 3200 3299 (hitcnt=1) 0x84568bcc&lt;BR /&gt;access-list wan_acl line 33 extended permit tcp 1.......................... range 3200 3299 (hitcnt=0) 0x50ccb828&lt;BR /&gt;access-list wan_acl line 34 extended permit ip any any log informational interval 300 (hitcnt=21858) 0x6ce7c2a3&lt;/P&gt;&lt;P&gt;simply create a search that includes the hex id '0x6ce7c2a3' and all it will show all traffic logged against that specific ace within the acl&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Feb 2023 07:49:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filter-out-a-specific-acl-traffic-within-acl-access-group/m-p/4781855#M1098133</guid>
      <dc:creator>ants_sec</dc:creator>
      <dc:date>2023-02-24T07:49:36Z</dc:date>
    </item>
  </channel>
</rss>

