<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA Logging Host vs ACL Logging in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947832#M150044</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We currently get all of our logging needs with our ASAs by using "logging host" command to send all firewall traffic to an event collector where we can search and correlate traffic events. I'm working to determine if there's any advantage to using the "log" command on the end of our extended access-lists in addition to this. In Cisco documentation, I'm finding &amp;nbsp;that using it results in ACL hits being grouped into "flows" as opposed to separate log messages for each hit, but not really sure why else it would be used. It mentions it could increase CPU usage enabling this on an ACL, but reduces the volume of logs produced. Any thoughts on why enabling "log" on extended ACLs is useful?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;LK&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 08:15:36 GMT</pubDate>
    <dc:creator>Logan Kampsnider</dc:creator>
    <dc:date>2019-03-12T08:15:36Z</dc:date>
    <item>
      <title>ASA Logging Host vs ACL Logging</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947832#M150044</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;We currently get all of our logging needs with our ASAs by using "logging host" command to send all firewall traffic to an event collector where we can search and correlate traffic events. I'm working to determine if there's any advantage to using the "log" command on the end of our extended access-lists in addition to this. In Cisco documentation, I'm finding &amp;nbsp;that using it results in ACL hits being grouped into "flows" as opposed to separate log messages for each hit, but not really sure why else it would be used. It mentions it could increase CPU usage enabling this on an ACL, but reduces the volume of logs produced. Any thoughts on why enabling "log" on extended ACLs is useful?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;LK&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 08:15:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947832#M150044</guid>
      <dc:creator>Logan Kampsnider</dc:creator>
      <dc:date>2019-03-12T08:15:36Z</dc:date>
    </item>
    <item>
      <title>Logging host logs all</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947833#M150045</link>
      <description>&lt;P&gt;Logging host logs all messages with the default buffered syslog level. This can be changed using logging buffered level command. Log parameter at the end of the access-list will always send a syslog message (permit &amp;amp; deny). Different access-lists have different syslog levels, so if log parameter is not configured, there's no guarantee it'll be sent to the syslog server depending on the level configured.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2016 04:47:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947833#M150045</guid>
      <dc:creator>Hozaifa Samad</dc:creator>
      <dc:date>2016-09-14T04:47:30Z</dc:date>
    </item>
    <item>
      <title>So to make sure I understand,</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947834#M150046</link>
      <description>So to make sure I understand, using the global "logging host" command would be the same as having "log" at the end of every ACL, granted that default logging levels are used in either situation?</description>
      <pubDate>Wed, 14 Sep 2016 13:06:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947834#M150046</guid>
      <dc:creator>Logan Kampsnider</dc:creator>
      <dc:date>2016-09-14T13:06:30Z</dc:date>
    </item>
    <item>
      <title>Not true. If the global log</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947835#M150047</link>
      <description>&lt;P&gt;Not true. If the&amp;nbsp;global log level is higher than the ACL log level, then yes. If the global log level is lower and the ACL log is not enabled then you won't see it. You'll have to enable the ACL log. Here's a link that shows you all the log levels and their id's:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/syslog-guide/syslogs/logsevp.html&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2016 14:53:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947835#M150047</guid>
      <dc:creator>Hozaifa Samad</dc:creator>
      <dc:date>2016-09-14T14:53:53Z</dc:date>
    </item>
    <item>
      <title>Thanks Hozaifa. So I'm not</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947836#M150050</link>
      <description>&lt;P&gt;Thanks Hozaifa. So I'm not sure I conveyed my last question correctly. If default log levels are used for both global and ACL logs, which I believe is log level 6, then is there any point to using ACL logs, other than if you want to add additional logging on a per-ACL level?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here's a default host logging, with no buffer config changes:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;logging enable&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging host MANAGEMENT 1.1.1.1&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Here's a default ACL logging level:&amp;nbsp;&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;&lt;B class="cBold"&gt;access-list outside-acl permit ip host 1.1.1.1 any log&lt;/B&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 14 Sep 2016 15:05:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947836#M150050</guid>
      <dc:creator>Logan Kampsnider</dc:creator>
      <dc:date>2016-09-14T15:05:27Z</dc:date>
    </item>
    <item>
      <title>Hi again. Your ACL entry will</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947837#M150052</link>
      <description>&lt;P&gt;Hi again. Your ACL entry will generate syslog message 106100 which is disabled by default, so ASA won't log it until it's enabled.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Sep 2016 15:26:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging-host-vs-acl-logging/m-p/2947837#M150052</guid>
      <dc:creator>Hozaifa Samad</dc:creator>
      <dc:date>2016-09-14T15:26:58Z</dc:date>
    </item>
  </channel>
</rss>

