<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic I assume you have no in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/effect-of-logging-all-rules-on-asa-performance/m-p/2906593#M161653</link>
    <description>&lt;P&gt;I assume you have no debugging running?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you actually need syslog to log every flow? &amp;nbsp;If you drop baccked to "warnings" if you only log dropped flows.&lt;/P&gt;</description>
    <pubDate>Fri, 10 Jun 2016 21:28:37 GMT</pubDate>
    <dc:creator>Philip D'Ath</dc:creator>
    <dc:date>2016-06-10T21:28:37Z</dc:date>
    <item>
      <title>Effect of logging all rules on ASA performance</title>
      <link>https://community.cisco.com/t5/network-security/effect-of-logging-all-rules-on-asa-performance/m-p/2906592#M161652</link>
      <description>&lt;P&gt;The default for access rules is to enable logging. Our older ASA is running at 80 percent CPU usage.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;The ASA Logging filters is set at:&lt;/P&gt;
&lt;P&gt;Internal Buffer - Severity Debugging&lt;/P&gt;
&lt;P&gt;ASDM - Severity Informational&lt;/P&gt;
&lt;P&gt;Syslog Servers - Severity Informational&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I'm trying to make the case for disabling logging of all rules and instead only log rules that we want to receive alerts for. We can enable logging on specific rules later for troubleshooting purposes if necessary. The syslog traffic alone is overwhelming the syslog server and filling the disk on a daily basis.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;How much of an impact does this level of logging have on the ASA's performance?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What CLI commands can I use to measure the impact on processes before and after making the changes to logging?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:52:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/effect-of-logging-all-rules-on-asa-performance/m-p/2906592#M161652</guid>
      <dc:creator>sdcampbell</dc:creator>
      <dc:date>2019-03-12T07:52:20Z</dc:date>
    </item>
    <item>
      <title>I assume you have no</title>
      <link>https://community.cisco.com/t5/network-security/effect-of-logging-all-rules-on-asa-performance/m-p/2906593#M161653</link>
      <description>&lt;P&gt;I assume you have no debugging running?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Do you actually need syslog to log every flow? &amp;nbsp;If you drop baccked to "warnings" if you only log dropped flows.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jun 2016 21:28:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/effect-of-logging-all-rules-on-asa-performance/m-p/2906593#M161653</guid>
      <dc:creator>Philip D'Ath</dc:creator>
      <dc:date>2016-06-10T21:28:37Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/effect-of-logging-all-rules-on-asa-performance/m-p/2906594#M161654</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please use the command sh process &lt;G class="gr_ gr_32 gr-alert gr_spell gr_run_anim ContextualSpelling ins-del multiReplace" id="32" data-gr-id="32"&gt;cpu&lt;/G&gt;-usage non-zero sorted and you would be able to know which process is contributing to high CPU usage.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Aditya&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Please rate helpful posts and mark correct answers.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Jun 2016 01:48:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/effect-of-logging-all-rules-on-asa-performance/m-p/2906594#M161654</guid>
      <dc:creator>Aditya Ganjoo</dc:creator>
      <dc:date>2016-06-11T01:48:10Z</dc:date>
    </item>
    <item>
      <title>I don't believe that we need</title>
      <link>https://community.cisco.com/t5/network-security/effect-of-logging-all-rules-on-asa-performance/m-p/2906595#M161655</link>
      <description>&lt;P&gt;I don't believe that we need to log every flow. I recently took over management of this firewall. I'd like to disable logging on most of those rules and also only send admin commands as well as errors to syslog, but I have to convince my boss of the need to change things as he previously managed the firewall and all changes must be approved by him.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Jun 2016 19:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/effect-of-logging-all-rules-on-asa-performance/m-p/2906595#M161655</guid>
      <dc:creator>sdcampbell</dc:creator>
      <dc:date>2016-06-12T19:01:04Z</dc:date>
    </item>
  </channel>
</rss>

