<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic what i need to do to see the in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819057#M174179</link>
    <description>&lt;P&gt;what i need to do to see the logs under "sh logging"?&lt;/P&gt;</description>
    <pubDate>Tue, 08 Dec 2015 10:13:23 GMT</pubDate>
    <dc:creator>mudasir05</dc:creator>
    <dc:date>2015-12-08T10:13:23Z</dc:date>
    <item>
      <title>ASA Logging</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819053#M174174</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have an ASA 5545 on which i have enabled logging,however i am not able to see logs when i take ssh session of the ASA.&lt;/P&gt;
&lt;P&gt;However on ASDM I am able to view logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 07:00:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819053#M174174</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2019-03-12T07:00:53Z</dc:date>
    </item>
    <item>
      <title>Hi there,</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819054#M174175</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;What is the output of:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;sh logging&lt;/PRE&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;My guess is that running:&lt;/P&gt;
&lt;PRE class="prettyprint"&gt;sh logging asdm&lt;/PRE&gt;
&lt;P&gt;...will show you what you're after.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;cheers,&lt;/P&gt;
&lt;P&gt;Seb.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2015 08:50:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819054#M174175</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2015-12-08T08:50:07Z</dc:date>
    </item>
    <item>
      <title>Hi Mudasir,</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819055#M174176</link>
      <description>&lt;P&gt;Hi Mudasir,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Adding to Seb's comment, refer following link to enable monitoring on ssh session:&lt;/P&gt;
&lt;P&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa80/configuration/guide/conf_gd/monitor.html#wp1065023&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;Rishabh Seth&lt;/P&gt;
&lt;P&gt;PS: Rate if it helps and mark answer as correct if it resolves your issue.&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2015 10:04:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819055#M174176</guid>
      <dc:creator>Rishabh Seth</dc:creator>
      <dc:date>2015-12-08T10:04:39Z</dc:date>
    </item>
    <item>
      <title>Hi Seb,</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819056#M174178</link>
      <description>&lt;P&gt;Hi Seb,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# sh logging &lt;BR /&gt;Syslog logging: enabled&lt;BR /&gt; Facility: 20&lt;BR /&gt; Timestamp logging: enabled&lt;BR /&gt; Standby logging: disabled&lt;BR /&gt; Debug-trace logging: enabled&lt;BR /&gt; Console logging: level alerts, 6 messages logged&lt;BR /&gt; Monitor logging: level alerts, 1549817102 messages logged&lt;BR /&gt; Buffer logging: level alerts, 0 messages logged&lt;BR /&gt; Trap logging: level informational, facility 20, 1775677694 messages logged&lt;BR /&gt; Permit-hostdown logging: disabled&lt;BR /&gt; History logging: level alerts, 6 messages logged&lt;BR /&gt; Device ID: disabled&lt;BR /&gt; Mail logging: list Failover, class auth, 0 messages logged&lt;BR /&gt; ASDM logging: level informational, 1775677695 messages logged&lt;/P&gt;
&lt;P&gt;=====&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;ciscoasa# sh logging asdm &lt;BR /&gt;6|Dec 08 2015 12:57:18|302013: Built outbound TCP connection 945703559 for Public:54.239.38.163/443 (54.239.38.163/443) to DMZ:192.168.3.16/34519 (10.10.10.16/34519)&lt;BR /&gt;6|Dec 08 2015 12:57:18|106015: Deny TCP (no connection) from 93.168.134.38/2242 to 10.10.10.16/443 flags RST on interface Public&lt;BR /&gt;6|Dec 08 2015 12:57:18|302014: Teardown TCP connection 945701986 for Public:93.169.169.149/1060 to DMZ:192.168.3.16/443 duration 0:00:10 bytes 11147 TCP FINs&lt;BR /&gt;6|Dec 08 2015 12:57:18|302013: Built inbound TCP connection 945703561 for Public:188.49.206.189/55008 (188.49.206.189/55008) to DMZ:192.168.3.17/443 (10.10.10.17/443)&lt;BR /&gt;6|Dec 08 2015 12:57:18|302013: Built inbound TCP connection 945703562 for Public:176.16.88.81/54617 (176.16.88.81/54617) to DMZ:192.168.3.17/443 (10.10.10.17/443)&lt;BR /&gt;6|Dec 08 2015 12:57:18|106015: Deny TCP (no connection) from 37.40.4.30/1857 to 10.10.10.17/443 flags RST ACK on interface Public&lt;BR /&gt;6|Dec 08 2015 12:57:18|302014: Teardown TCP connection 945703500 for Public:54.243.31.226/46367 to DMZ:192.168.3.16/80 duration 0:00:00 bytes 1307 TCP FINs&lt;BR /&gt;6|Dec 08 2015 12:57:18|302013: Built inbound TCP connection 945703564 for Public:188.135.42.99/45658 (188.135.42.99/45658) to DMZ:192.168.3.17/443 (10.10.10.17/443)&lt;BR /&gt;6|Dec 08 2015 12:57:18|106015: Deny TCP (no connection) from 82.178.195.102/52868 to 10.10.10.16/443 flags FIN ACK on interface Public&lt;BR /&gt;6|Dec 08 2015 12:57:18|302013: Built inbound TCP connection 945703566 for Public:95.185.59.232/1188 (95.185.59.232/1188) to DMZ:192.168.3.16/443 (10.10.10.16/443)&lt;BR /&gt;6|Dec 08 2015 12:57:18|302013: Built outbound TCP connection 945703567 for DMZ:192.168.3.45/80 (192.168.3.45/80) to inside:192.168.5.2/38446 (192.168.5.2/38446)&lt;BR /&gt;5|Dec 08 2015 12:57:18|304001: 192.168.5.2 Accessed URL 192.168.3.45:http://192.168.3.45/api/external&lt;BR /&gt;6|Dec 08 2015 12:57:18|302013: Built inbound TCP connection 945703568 for Public:77.218.231.130/1292 (77.218.231.130/1292) to DMZ:192.168.3.17/443 (10.10.10.17/443)&lt;BR /&gt;6|Dec 08 2015 12:57:18|302014: Teardown TCP connection 945687578 for Public:5.110.96.146/52305 to DMZ:192.168.3.16/443 duration 0:01:48 bytes 9623 TCP Reset-O&lt;BR /&gt;6|Dec 08 2015 12:57:18|302016: Teardown UDP connection 945703545 for Public:8.8.8.8/53 to DMZ:192.168.3.17/53240 duration 0:00:00 bytes 279&lt;BR /&gt;6|Dec 08 2015 12:57:18|302014: Teardown TCP connection 945681108 for Public:93.169.206.200/1043 to DMZ:192.168.3.17/443 duration 0:02:31 bytes 8845 TCP Reset-O&lt;BR /&gt;6|Dec 08 2015 12:57:18|302013: Built outbound TCP connection 945703569 for Public:54.239.38.163/443 (54.239.38.163/443) to DMZ:192.168.3.17/49393 (10.10.10.17/49393)&lt;BR /&gt;6|Dec 08 2015 12:57:18|302013: Built inbound TCP connection 945703570 for Public:77.31.28.115/55589 (77.31.28.115/55589) to DMZ:192.168.3.17/443 (10.10.10.17/443)&lt;BR /&gt;6|Dec 08 2015 12:57:18|106015: Deny TCP (no connection) from 93.169.206.200/1043 to 10.10.10.17/443 flags RST on interface Public&lt;BR /&gt;6|Dec 08 2015 12:57:18|106015: Deny TCP (no connection) from 93.169.206.200/1043 to 10.10.10.17/443 flags RST on interface Public&lt;BR /&gt;6|Dec 08 2015 12:57:18|302013: Built outbound TCP connection 945703573 for DMZ:192.168.3.45/80 (192.168.3.45/80) to inside:192.168.5.2/52333 (192.168.5.2/52333)&lt;BR /&gt;6|Dec 08 2015 12:57:18|302021: Teardown ICMP connection for faddr 128.234.71.151/0 gaddr 10.10.10.17/0 laddr 192.168.3.17/0&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2015 10:09:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819056#M174178</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2015-12-08T10:09:57Z</dc:date>
    </item>
    <item>
      <title>what i need to do to see the</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819057#M174179</link>
      <description>&lt;P&gt;what i need to do to see the logs under "sh logging"?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2015 10:13:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819057#M174179</guid>
      <dc:creator>mudasir05</dc:creator>
      <dc:date>2015-12-08T10:13:23Z</dc:date>
    </item>
    <item>
      <title>Hi there,</title>
      <link>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819058#M174182</link>
      <description>&lt;P&gt;Hi there,&lt;/P&gt;
&lt;P&gt;The '&lt;STRONG&gt;sh logging&lt;/STRONG&gt;' command shows us the state of the ASA logging configuration. &lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;'&lt;STRONG&gt;sh logging asdm&lt;/STRONG&gt;'&amp;nbsp; shows us the the contents of the asdm log buffer since last clear/ reboot.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;What more of the logs do you need to see?&lt;/P&gt;
&lt;P&gt;Perhaps you want to look at configuring a syslog server which will make trawling though the logs easier, or better still a SIEM create correlation rules?&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2015 10:38:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-logging/m-p/2819058#M174182</guid>
      <dc:creator>Seb Rupik</dc:creator>
      <dc:date>2015-12-08T10:38:35Z</dc:date>
    </item>
  </channel>
</rss>

