<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Audit log on cisco ASA firewall. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3710864#M13545</link>
    <description>&lt;P&gt;There are several users with administrator role on network devices. sometime configuration change without acknowledgement. I want to know who have been log in and what they have made change.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How to monitor this activity on cisco ASA, switch or router?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 16:15:57 GMT</pubDate>
    <dc:creator>_Ratha_</dc:creator>
    <dc:date>2020-02-21T16:15:57Z</dc:date>
    <item>
      <title>Audit log on cisco ASA firewall.</title>
      <link>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3710864#M13545</link>
      <description>&lt;P&gt;There are several users with administrator role on network devices. sometime configuration change without acknowledgement. I want to know who have been log in and what they have made change.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How to monitor this activity on cisco ASA, switch or router?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3710864#M13545</guid>
      <dc:creator>_Ratha_</dc:creator>
      <dc:date>2020-02-21T16:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Audit log on cisco ASA firewall.</title>
      <link>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3710967#M13546</link>
      <description>&lt;P&gt;How is your user authentication setup done, you have ACS or any other mechanism in place for authentication and authorization ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 07:30:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3710967#M13546</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2018-09-21T07:30:42Z</dc:date>
    </item>
    <item>
      <title>Re: Audit log on cisco ASA firewall.</title>
      <link>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3711015#M13547</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/286878"&gt;@balaji.bandi&lt;/a&gt;&amp;nbsp;alluded, an Accounting server (the third "A" in AAA) is the answer. An external RADIUS or TACACS+ server (like Cisco ISE) can keep a log of all actions.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also set the ASA to log all login and command execution actions and send those logs to an external syslog server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logging enable&lt;BR /&gt;logging list cmds message 111009&lt;/P&gt;
&lt;P&gt;logging trap cmds&lt;/P&gt;
&lt;P&gt;logging host inside x.x.x.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can replace 'inside' with the name of interface where syslog server x.x.x.x resides.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Sep 2018 09:31:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3711015#M13547</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2018-09-21T09:31:36Z</dc:date>
    </item>
    <item>
      <title>Re: Audit log on cisco ASA firewall.</title>
      <link>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3932476#M13548</link>
      <description>Hello,&lt;BR /&gt;if Informational Logs are being forwarded to an external syslog.. then will message ids 111008-111010 will get auto logged to syslog ?</description>
      <pubDate>Mon, 30 Sep 2019 13:29:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3932476#M13548</guid>
      <dc:creator>NeWGuy1109</dc:creator>
      <dc:date>2019-09-30T13:29:19Z</dc:date>
    </item>
    <item>
      <title>Re: Audit log on cisco ASA firewall.</title>
      <link>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3932518#M13549</link>
      <description>&lt;P&gt;111008 and 111010 are notification (level 5), so yes for those.&lt;/P&gt;
&lt;P&gt;111009 is debug (level 7), so no for that one.&lt;/P&gt;
&lt;P&gt;(Unless you override the default severity level)&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/syslog/b_syslog/syslogs1.html#con_8587071" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/syslog/b_syslog/syslogs1.html#con_8587071&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 14:16:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3932518#M13549</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-09-30T14:16:17Z</dc:date>
    </item>
    <item>
      <title>Re: Audit log on cisco ASA firewall.</title>
      <link>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3933004#M13550</link>
      <description>Thanks for the reply..&lt;BR /&gt;i am using algosec firewall analyzer and all syslogs from firewalls are being forwarded to it .. i can see the configuration modification (under raw configuration) but the user id is not available .. is there any way the commands being run from a session in ASA can be sent as audit log information ? does asa record user id in raw configuration ? the hide username setting is also disabled.</description>
      <pubDate>Tue, 01 Oct 2019 10:10:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/3933004#M13550</guid>
      <dc:creator>NeWGuy1109</dc:creator>
      <dc:date>2019-10-01T10:10:33Z</dc:date>
    </item>
    <item>
      <title>Re: Audit log on cisco ASA firewall.</title>
      <link>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/4310294#M1079425</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Based on my below logging config , should this send TRAP for Event ID 111008 to my Event Server ( Cisco Security Manager ) ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also can you share the Doc where Event ID's are mapped according to Severity&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;logging enable&lt;BR /&gt;logging buffer-size 10000&lt;BR /&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;BR /&gt;logging asdm informational&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;logging facility 22&lt;/P&gt;&lt;P&gt;logging host inside CSM_IP&lt;/P&gt;&lt;P&gt;logging message 305011 level debugging&lt;BR /&gt;logging message 302015 level debugging&lt;BR /&gt;logging message 302016 level debugging&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 19 Mar 2021 10:02:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/4310294#M1079425</guid>
      <dc:creator>MSJ1</dc:creator>
      <dc:date>2021-03-19T10:02:41Z</dc:date>
    </item>
    <item>
      <title>Re: Audit log on cisco ASA firewall.</title>
      <link>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/4313347#M1079575</link>
      <description>&lt;P&gt;Can you share the Doc where Event ID's are mapped according to Severity&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 19:52:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/4313347#M1079575</guid>
      <dc:creator>MSJ1</dc:creator>
      <dc:date>2021-03-24T19:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: Audit log on cisco ASA firewall.</title>
      <link>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/4313397#M1079577</link>
      <description>&lt;P&gt;below document has this information :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/asa/syslog/b_syslog/messages-listed-by-severity-level.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/asa/syslog/b_syslog/messages-listed-by-severity-level.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Mar 2021 20:37:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-log-on-cisco-asa-firewall/m-p/4313397#M1079577</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2021-03-24T20:37:49Z</dc:date>
    </item>
  </channel>
</rss>

