<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi there in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/3046774#M134809</link>
    <description>&lt;P&gt;Hi there&lt;/P&gt;
&lt;P&gt;Basically an external company wants&amp;nbsp;a port forward&amp;nbsp;to another system, SIP based, I've done the port changes they asked, it works when i test the rules with some other IP but the other vendor insist I haven't as it doesn't work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But I cant see the traffic hitting the ports for the logs so it hard to prove that the traffic is hitting the ASA at all.&lt;/P&gt;
&lt;P&gt;If I can get the logging&amp;nbsp;log everything,&amp;nbsp;I'm hoping it will tell me where the traffic is actually doing.&lt;/P&gt;</description>
    <pubDate>Mon, 12 Jun 2017 07:34:09 GMT</pubDate>
    <dc:creator>Alan Douglas</dc:creator>
    <dc:date>2017-06-12T07:34:09Z</dc:date>
    <item>
      <title>ASA Logging</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/3046772#M134807</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;
&lt;P&gt;I'm having issues with the logging configuration on cisco ASA's, the asa's will log blocked traffic to the asdm console and systelog but it seems to deplend on the incoming ports.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It is logging at level 4, which looks like it should log blocked IP however its skipping traffic.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;It logs icmp, 22 80 but non unknown ports link 10000 or 7000.&lt;/P&gt;
&lt;P&gt;Id like to see all of the blocked traffic for debug reasons, how to I get the logging to show all blocks.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank in advance.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 09:29:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging/m-p/3046772#M134807</guid>
      <dc:creator>Alan Douglas</dc:creator>
      <dc:date>2019-03-12T09:29:20Z</dc:date>
    </item>
    <item>
      <title>Incoming traffic to a non</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/3046773#M134808</link>
      <description>&lt;P&gt;Incoming traffic to a non-listening port would be exepcted to be dropped silently.&lt;/P&gt;
&lt;P&gt;I've not tried it but if you were to put in a final ACL entry with the "control-plane" and 'log" options you might get those events as syslog events.&lt;/P&gt;
&lt;P&gt;Why would you want to?&lt;/P&gt;</description>
      <pubDate>Sun, 11 Jun 2017 17:33:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging/m-p/3046773#M134808</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-11T17:33:18Z</dc:date>
    </item>
    <item>
      <title>Hi there</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/3046774#M134809</link>
      <description>&lt;P&gt;Hi there&lt;/P&gt;
&lt;P&gt;Basically an external company wants&amp;nbsp;a port forward&amp;nbsp;to another system, SIP based, I've done the port changes they asked, it works when i test the rules with some other IP but the other vendor insist I haven't as it doesn't work.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But I cant see the traffic hitting the ports for the logs so it hard to prove that the traffic is hitting the ASA at all.&lt;/P&gt;
&lt;P&gt;If I can get the logging&amp;nbsp;log everything,&amp;nbsp;I'm hoping it will tell me where the traffic is actually doing.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2017 07:34:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging/m-p/3046774#M134809</guid>
      <dc:creator>Alan Douglas</dc:creator>
      <dc:date>2017-06-12T07:34:09Z</dc:date>
    </item>
    <item>
      <title>OK - that makes sense. You</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/3046775#M134810</link>
      <description>&lt;P&gt;OK - that makes sense. You can also run a packet capture on the ASA for the traffic in question and review that. You can filter the capture with the usual 5-tuple (protocol, source/dest addresses and ports) as well as interface. You can capture on both input and output interfaces.&lt;/P&gt;
&lt;P&gt;I always find the actual bits on the wire as a good way to end such arguments about whether or not certain traffic is arriiving as expected. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2017 14:25:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging/m-p/3046775#M134810</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2017-06-12T14:25:13Z</dc:date>
    </item>
  </channel>
</rss>

