<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Traffic Logs In ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/traffic-logs-in-asa/m-p/3527345#M145114</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;STRONG style="font-size: 10.8px; font-family: arial; color: #3d3d3d;"&gt;&lt;A _jive_internal="true" data-avatarid="-1" data-userid="367058" data-username="gillharmeet86@cisco.com" href="https://community.cisco.com/people/gillharmeet86@cisco.com" style="padding: 0 3px 0 0; font-weight: inherit; font-style: inherit; font-size: 1.1em; font-family: inherit; color: #0a63a7;"&gt;Harmeet Singh&lt;/A&gt;&lt;/STRONG&gt;, with these commands you will able to see all event on your ASA from CLI.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;configure terminal&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;logging buffer-size 500000&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; [select your size]&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;logging buffered debugging&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; [select your level]&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;logging enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you will able to view with &lt;STRONG&gt;show logging. &lt;/STRONG&gt;You can use&lt;STRONG&gt; | grep&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;for getting filters.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Here there are two useful links for syslog:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html" title="http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html"&gt;ASA Syslog Configuration Example - Cisco&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A href="https://supportforums.cisco.com/document/73511/how-enable-syslogs-asa" title="https://supportforums.cisco.com/document/73511/how-enable-syslogs-asa"&gt;https://supportforums.cisco.com/document/73511/how-enable-syslogs-asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 09 May 2017 20:41:00 GMT</pubDate>
    <dc:creator>#Mat</dc:creator>
    <dc:date>2017-05-09T20:41:00Z</dc:date>
    <item>
      <title>Traffic Logs In ASA</title>
      <link>https://community.cisco.com/t5/network-security/traffic-logs-in-asa/m-p/3527341#M145106</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It may be a repeated or very simple question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How can I see and store the traffic (Live &amp;amp; Historical) details that is passing my ASA (IPs, Ports etc..)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Harmeet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 09 Apr 2017 10:28:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-logs-in-asa/m-p/3527341#M145106</guid>
      <dc:creator>Harmeet Singh</dc:creator>
      <dc:date>2017-04-09T10:28:35Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Logs In ASA</title>
      <link>https://community.cisco.com/t5/network-security/traffic-logs-in-asa/m-p/3527342#M145108</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hi Harmeet,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you have the ASA of any model you can use the following 2 methods to analyze the traffic that is passing from the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- From- CLI&lt;/P&gt;&lt;P&gt;2- From -ASDM (ASA Device Manager)&lt;/P&gt;&lt;P&gt;3-capture traffic (only which is required)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;before you move ahead, please note that firewalls usually dont have any storage space that can stored the traffic logs that is passing through it, until unless you have installed a Flash Card or USB. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1 - From CLI&lt;/P&gt;&lt;P&gt;from cli you execute many commands like the simple one is &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;show logging: will display the running traffic &lt;/LI&gt;&lt;LI&gt;show nat: will update you the translation information&lt;/LI&gt;&lt;LI&gt;show xlate: will update you the static and dynamic table&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif; font-size: 14.4px;"&gt;Show show conn, and show local-host conn &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif; font-size: 14.4px;"&gt;show proc &lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif; font-size: 14.4px;"&gt;show asp drop&lt;/SPAN&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;SPAN style="color: #333333; font-family: Arial, sans-serif; font-size: 14.4px;"&gt;and so on the link below is the command reference guide in detail and will help you to get all the possible commands you want to execute.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2- ASDM:&lt;/P&gt;&lt;P&gt;from asdm it is quite easy and very informative to use. from asdm manager you can follow the following steps and can see the running traffic or live traffic or can filter the traffic as you require&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;login via asdm&lt;/P&gt;&lt;P&gt;after you login you will see that at the bottom of the asdm the logs are running which you can review, stop pause or start&lt;/P&gt;&lt;P&gt;click Monitoring from the top tab its option number 3&lt;/P&gt;&lt;P&gt;now on your right you will see all the ARP table learned by firewall&lt;/P&gt;&lt;P&gt;on left pane click logging&lt;/P&gt;&lt;P&gt;after you click logging, the right pane will change and you will have option to view&lt;/P&gt;&lt;P&gt;click view button&lt;/P&gt;&lt;P&gt;when you click view button, a new window will open and you will see all the logs that are currently being passed from firewall&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;you can use filter to search any specific information&lt;/P&gt;&lt;P&gt;you can create a filter to search &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you dont have any logging server then, you would require one to send your logs for proper storage and configure your security device on certain level&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;i hope this information will help you.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/command/reference/cmd_ref/s1.html" title="http://www.cisco.com/c/en/us/td/docs/security/asa/asa82/command/reference/cmd_ref/s1.html"&gt;Cisco ASA 5500 Series Command Reference, 8.2 - same-security-traffic -- show asdm sessions [Cisco ASA 5500-X Series Fire…&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Apr 2017 19:11:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-logs-in-asa/m-p/3527342#M145108</guid>
      <dc:creator>usman ali dar</dc:creator>
      <dc:date>2017-04-10T19:11:45Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Logs In ASA</title>
      <link>https://community.cisco.com/t5/network-security/traffic-logs-in-asa/m-p/3527343#M145110</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;DIV&gt;&lt;P&gt;1. network interface utiliz - use snmp.&lt;/P&gt;&lt;P&gt;2. utilize "l3"&amp;nbsp; - use netflow.&lt;/P&gt;&lt;P&gt;graph+history....&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 19 Apr 2017 16:04:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-logs-in-asa/m-p/3527343#M145110</guid>
      <dc:creator>Kuat Bakenov</dc:creator>
      <dc:date>2017-04-19T16:04:54Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Logs In ASA</title>
      <link>https://community.cisco.com/t5/network-security/traffic-logs-in-asa/m-p/3527344#M145112</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;if you mean the logs then you can use syslog server and configure the remote syslog on the firewall for example use kiwi syslog server&lt;/P&gt;&lt;P&gt;if you mean bandwidth monitor then maybe some good nms like prtg would be good, i have tried open source like cacti and its bad because its and to find templates for the ASA&lt;/P&gt;&lt;P&gt;also you have packet capture that you can start and then store and then open using wireshark &lt;/P&gt;&lt;P&gt;also you have netflow&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but for what i think would be less impact on the firewall is remote syslog server with enabling trap informational&lt;/P&gt;&lt;P&gt;and you can buy something like manage-engine log analyzer to read your logs....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 May 2017 19:42:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-logs-in-asa/m-p/3527344#M145112</guid>
      <dc:creator>Samer R. Saleem</dc:creator>
      <dc:date>2017-05-09T19:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: Traffic Logs In ASA</title>
      <link>https://community.cisco.com/t5/network-security/traffic-logs-in-asa/m-p/3527345#M145114</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;STRONG style="font-size: 10.8px; font-family: arial; color: #3d3d3d;"&gt;&lt;A _jive_internal="true" data-avatarid="-1" data-userid="367058" data-username="gillharmeet86@cisco.com" href="https://community.cisco.com/people/gillharmeet86@cisco.com" style="padding: 0 3px 0 0; font-weight: inherit; font-style: inherit; font-size: 1.1em; font-family: inherit; color: #0a63a7;"&gt;Harmeet Singh&lt;/A&gt;&lt;/STRONG&gt;, with these commands you will able to see all event on your ASA from CLI.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;configure terminal&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;logging buffer-size 500000&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; [select your size]&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;logging buffered debugging&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; [select your level]&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;logging enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you will able to view with &lt;STRONG&gt;show logging. &lt;/STRONG&gt;You can use&lt;STRONG&gt; | grep&lt;/STRONG&gt;&lt;STRONG&gt; &lt;/STRONG&gt;for getting filters.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Here there are two useful links for syslog:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html" title="http://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html"&gt;ASA Syslog Configuration Example - Cisco&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;A href="https://supportforums.cisco.com/document/73511/how-enable-syslogs-asa" title="https://supportforums.cisco.com/document/73511/how-enable-syslogs-asa"&gt;https://supportforums.cisco.com/document/73511/how-enable-syslogs-asa&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards.-&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 May 2017 20:41:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/traffic-logs-in-asa/m-p/3527345#M145114</guid>
      <dc:creator>#Mat</dc:creator>
      <dc:date>2017-05-09T20:41:00Z</dc:date>
    </item>
  </channel>
</rss>

