<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Logging uses CPU and memory. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/acl-logging/m-p/3014673#M146433</link>
    <description>&lt;P&gt;Logging uses CPU and memory.&lt;/P&gt;
&lt;P&gt;I would not go as far as saying that I advise against it, but lean more on the side of caution. Just keep in mind that if you do experience a decrease in performance that this could be due to the amount of logging going on. Of course this also depends on what level of logging you are doing. &amp;nbsp;Debuging would most definately have a performance impact with a huge amout of traffic passing through. &amp;nbsp;Informational or notification will have less of an impact.&lt;/P&gt;
&lt;P&gt;The enable logging in the ASDM will just enable logging for the ASDM, not what is being logged to the ASDM.&lt;/P&gt;
&lt;P&gt;So, the only way I know of to do this is manually or have a programmer create a script that will do it for you.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
    <pubDate>Thu, 16 Feb 2017 21:50:49 GMT</pubDate>
    <dc:creator>Marius Gunnerud</dc:creator>
    <dc:date>2017-02-16T21:50:49Z</dc:date>
    <item>
      <title>ACL Logging</title>
      <link>https://community.cisco.com/t5/network-security/acl-logging/m-p/3014670#M146424</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Hi all,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I need help with something.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;I manage a multi-context firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;The rulebase is huge!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Up until this point we never configured ACL logging on the rules.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;Now the client wants use to log the ACL's.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 10pt;"&gt;ie:&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV style="left: 359.901px; top: 233.274px; font-size: 13.3px; font-family: monospace; transform: scaleX(0.999647);"&gt;&lt;SPAN style="font-size: 10pt;"&gt;access-list TEST deny ip any any &lt;STRONG&gt;log&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="left: 359.901px; top: 233.274px; font-size: 13.3px; font-family: monospace; transform: scaleX(0.999647);"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;STRONG&gt;&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="left: 359.901px; top: 233.274px; font-size: 13.3px; font-family: monospace; transform: scaleX(0.999647);"&gt;&lt;SPAN style="font-size: 10pt;"&gt;I would need to add the word "log" to the end of every ACL - but in this case there are literally thousands of ACL's.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="left: 359.901px; top: 233.274px; font-size: 13.3px; font-family: monospace; transform: scaleX(0.999647);"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="left: 359.901px; top: 233.274px; font-size: 13.3px; font-family: monospace; transform: scaleX(0.999647);"&gt;&lt;SPAN style="font-size: 10pt;"&gt;Is there a command that I can run that will log all ACL's without me having to physically go back to each ACL statement and have to add the word "log" at the end of it?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="left: 359.901px; top: 233.274px; font-size: 13.3px; font-family: monospace; transform: scaleX(0.999647);"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="left: 359.901px; top: 233.274px; font-size: 13.3px; font-family: monospace; transform: scaleX(0.999647);"&gt;&lt;SPAN style="font-size: 10pt;"&gt;Urgent assistance would be greatly appreciated!&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="left: 359.901px; top: 233.274px; font-size: 13.3px; font-family: monospace; transform: scaleX(0.999647);"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="left: 359.901px; top: 233.274px; font-size: 13.3px; font-family: monospace; transform: scaleX(0.999647);"&gt;&lt;SPAN style="font-size: 10pt;"&gt;Kind regards&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="left: 359.901px; top: 233.274px; font-size: 13.3px; font-family: monospace; transform: scaleX(0.999647);"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="left: 359.901px; top: 233.274px; font-size: 13.3px; font-family: monospace; transform: scaleX(0.999647);"&gt;&lt;SPAN style="font-size: 10pt;"&gt;&amp;nbsp;- Dale&lt;/SPAN&gt;&lt;/DIV&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-logging/m-p/3014670#M146424</guid>
      <dc:creator>dalem00011</dc:creator>
      <dc:date>2019-03-12T08:56:51Z</dc:date>
    </item>
    <item>
      <title>As far as I know, you would</title>
      <link>https://community.cisco.com/t5/network-security/acl-logging/m-p/3014671#M146428</link>
      <description>&lt;P&gt;As far as I know, you would need to add the log keyword at the end of each entry. &amp;nbsp;An option is to create a script that will go through your configuration and pull out the access list entries, add the log keyword to the end and then paste it back in. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;Depending on how much traffic actually passes through your firewall, I would caution your client about enabling logging on all the ACL entries. &amp;nbsp;If there is a lot of traffic passing through your ASA, this will impact performance. &amp;nbsp;Perhaps if you are able to narrow it down a bit to critical entries?&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2017 21:12:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-logging/m-p/3014671#M146428</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-16T21:12:46Z</dc:date>
    </item>
    <item>
      <title>Thanks for your swift</title>
      <link>https://community.cisco.com/t5/network-security/acl-logging/m-p/3014672#M146431</link>
      <description>&lt;P&gt;Thanks for your swift response Marius.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;There are huge amounts of traffic passing through this multi-context ASA.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The client wants logging on all ACL's - I think its for some kind of Tufin integration.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So you would advise against this?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Also, then just to clarify, in ASDM, under logging, there is a check box which states "enable logging" - Would this not maybe solve my issue?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2017 21:20:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-logging/m-p/3014672#M146431</guid>
      <dc:creator>dalem00011</dc:creator>
      <dc:date>2017-02-16T21:20:28Z</dc:date>
    </item>
    <item>
      <title>Logging uses CPU and memory.</title>
      <link>https://community.cisco.com/t5/network-security/acl-logging/m-p/3014673#M146433</link>
      <description>&lt;P&gt;Logging uses CPU and memory.&lt;/P&gt;
&lt;P&gt;I would not go as far as saying that I advise against it, but lean more on the side of caution. Just keep in mind that if you do experience a decrease in performance that this could be due to the amount of logging going on. Of course this also depends on what level of logging you are doing. &amp;nbsp;Debuging would most definately have a performance impact with a huge amout of traffic passing through. &amp;nbsp;Informational or notification will have less of an impact.&lt;/P&gt;
&lt;P&gt;The enable logging in the ASDM will just enable logging for the ASDM, not what is being logged to the ASDM.&lt;/P&gt;
&lt;P&gt;So, the only way I know of to do this is manually or have a programmer create a script that will do it for you.&lt;/P&gt;
&lt;P&gt;--&lt;/P&gt;
&lt;P&gt;Please remember to select a correct answer and rate helpful posts&lt;/P&gt;</description>
      <pubDate>Thu, 16 Feb 2017 21:50:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-logging/m-p/3014673#M146433</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2017-02-16T21:50:49Z</dc:date>
    </item>
    <item>
      <title>Thanks Marius.</title>
      <link>https://community.cisco.com/t5/network-security/acl-logging/m-p/3014674#M146435</link>
      <description>&lt;P&gt;Thanks Marius.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Your advice has been noted.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For now I have informed the client of the risks involved. We plan to roll it out little by little so we can monitor how the ASA handles it.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I also advised we do this only on business critical ACL's.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Fingers crossed all goes well and they take my advice.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;But thanks again Marius.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Appreciate it!&lt;/P&gt;</description>
      <pubDate>Fri, 17 Feb 2017 11:56:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/acl-logging/m-p/3014674#M146435</guid>
      <dc:creator>dalem00011</dc:creator>
      <dc:date>2017-02-17T11:56:51Z</dc:date>
    </item>
  </channel>
</rss>

