<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can you please explain some in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-log-analyzer/m-p/2793953#M172851</link>
    <description>&lt;P&gt;Can you please explain some more?&lt;/P&gt;
&lt;P&gt;Do you want to see all connections and flows transiting the firewall?&lt;/P&gt;
&lt;P&gt;If so, you can just turn your system logging up to level 6 (informational). All TCP connections, UDP and ICMP flows will then create a syslog message that you can see either in the logging buffer, ASDM log screen or on any third party syslog server destination you have defined.&lt;/P&gt;
&lt;P&gt;The log messages are just plain text records so you can parse and analyze them on your external syslog server using anything from simple text sorting, to *nix tools like grep and sed, to the capabilities of a commercial syslog analyzer like Kiwi syslog analyzer. You can also use the capability built into a fuill feature network management tool like Cisco Prime Infrastructure or Solarwinds NPM. &amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 05 Feb 2016 15:46:27 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2016-02-05T15:46:27Z</dc:date>
    <item>
      <title>ASA log analyzer</title>
      <link>https://community.cisco.com/t5/network-security/asa-log-analyzer/m-p/2793952#M172849</link>
      <description>&lt;P&gt;Hello, on ASA interface is "permit any any" rule, and I need to create ACL based on that log. Is anybody aware about any tool which can do it?&lt;/P&gt;
&lt;P&gt;Many thanks for advice&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:14:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-log-analyzer/m-p/2793952#M172849</guid>
      <dc:creator>Michal Valach</dc:creator>
      <dc:date>2019-03-12T07:14:39Z</dc:date>
    </item>
    <item>
      <title>Can you please explain some</title>
      <link>https://community.cisco.com/t5/network-security/asa-log-analyzer/m-p/2793953#M172851</link>
      <description>&lt;P&gt;Can you please explain some more?&lt;/P&gt;
&lt;P&gt;Do you want to see all connections and flows transiting the firewall?&lt;/P&gt;
&lt;P&gt;If so, you can just turn your system logging up to level 6 (informational). All TCP connections, UDP and ICMP flows will then create a syslog message that you can see either in the logging buffer, ASDM log screen or on any third party syslog server destination you have defined.&lt;/P&gt;
&lt;P&gt;The log messages are just plain text records so you can parse and analyze them on your external syslog server using anything from simple text sorting, to *nix tools like grep and sed, to the capabilities of a commercial syslog analyzer like Kiwi syslog analyzer. You can also use the capability built into a fuill feature network management tool like Cisco Prime Infrastructure or Solarwinds NPM. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 Feb 2016 15:46:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-log-analyzer/m-p/2793953#M172851</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2016-02-05T15:46:27Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/asa-log-analyzer/m-p/2793954#M172853</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;There are a few tools available for your need, none of them is free though as this is one critical piece that lots of security admins want to address.&lt;/P&gt;
&lt;P&gt;The one I've used is called AFA (AlgoSec Firewall Analyzer) featured called Intelligent Policy Tuning (there are FireMON, Tuffin as well) You have to connect this appliance to the FW and send specific logs to the appliance so that the appliance will give you more tighter rules and objects instead of any any.&lt;/P&gt;
&lt;P&gt;Hope this helps.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Sat, 06 Feb 2016 04:41:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-log-analyzer/m-p/2793954#M172853</guid>
      <dc:creator>Ji-Won Park</dc:creator>
      <dc:date>2016-02-06T04:41:27Z</dc:date>
    </item>
    <item>
      <title>Hello Marvin,</title>
      <link>https://community.cisco.com/t5/network-security/asa-log-analyzer/m-p/2793955#M172854</link>
      <description>&lt;P&gt;Hello Marvin,&lt;/P&gt;
&lt;P&gt;We have 4 interfaces, were last ACL rule is " permit any any ( level 6)", and those logs are sent to some syslog. So yes what I did was usign grep/pipe and excel to create flow from the logs.&lt;/P&gt;
&lt;P&gt;I was asking if there is any tool, but I believe there is not. Algosec/Tufin can do it as Ji Won mentioned it, but they are analysing flow online. But I have txt file and have to extract it.&lt;/P&gt;
&lt;P&gt;Thank you&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 07 Feb 2016 10:21:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-log-analyzer/m-p/2793955#M172854</guid>
      <dc:creator>Michal Valach</dc:creator>
      <dc:date>2016-02-07T10:21:12Z</dc:date>
    </item>
  </channel>
</rss>

