<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA5506-X Trying to email syslog alerts through Site to Site VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5506-x-trying-to-email-syslog-alerts-through-site-to-site-vpn/m-p/2694716#M193188</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am attempting to configure email notification of critical syslog messages to use my corporate email server. Testing with a packet capture I noticed the email was being sent over the&amp;nbsp;outside interface and not the inside interface. It appears to be ignoring the NAT statements supporting the VPN.&lt;/P&gt;
&lt;P&gt;Is there a way to tell the ASA which interface to use for the SMTP server?&lt;/P&gt;
&lt;P&gt;snips from running config below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
!
interface GigabitEthernet1/1
 nameif outside
 security-level 0
 ip address 71.xxx.xxx.xxx 255.255.255.0 

!
interface GigabitEthernet1/3
 nameif inside
 security-level 100
 ip address 10.10.99.1 255.255.255.0 
&lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
object network Corp
 subnet 172.16.0.0 255.255.0.0
 description Corporate segment&lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
object-group network DM_INLINE_NETWORK_1
 network-object 10.10.99.0 255.255.255.0&lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
access-list outside_cryptomap_1 extended permit ip object-group DM_INLINE_NETWORK_1 object Corp &lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
logging enable
logging timestamp
logging list EmailNotification level critical
logging trap notifications
logging asdm informational
logging mail EmailNotification
logging from-address H99fw@xxxxx.com
logging recipient-address fwmon@xxxxx.com level errors
logging device-id hostname
logging host inside 172.16.0.13&lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
nat (inside,outside) source static any any destination static Corp Corp no-proxy-arp route-lookup
&lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
smtp-server 172.16.0.2&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help is appreciated.&lt;/P&gt;
&lt;P&gt;Adding packet capture from outside interface with my ip xx'ed out:&lt;/P&gt;
&lt;P&gt;9 packets captured&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;1: 09:32:59.280121 &amp;nbsp; &amp;nbsp; &amp;nbsp; 71.xxx.xxx.xxx.34977 &amp;gt; 172.16.0.2.25: S 1280585985:1280585985(0) win 32768 &amp;lt;mss 1460,nop,nop,timestamp 154282920 0&amp;gt;&lt;/P&gt;
&lt;P&gt;Packet capture for inside interface had nothing.&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 06:21:48 GMT</pubDate>
    <dc:creator>Don Bonnice</dc:creator>
    <dc:date>2019-03-12T06:21:48Z</dc:date>
    <item>
      <title>ASA5506-X Trying to email syslog alerts through Site to Site VPN</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-x-trying-to-email-syslog-alerts-through-site-to-site-vpn/m-p/2694716#M193188</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I am attempting to configure email notification of critical syslog messages to use my corporate email server. Testing with a packet capture I noticed the email was being sent over the&amp;nbsp;outside interface and not the inside interface. It appears to be ignoring the NAT statements supporting the VPN.&lt;/P&gt;
&lt;P&gt;Is there a way to tell the ASA which interface to use for the SMTP server?&lt;/P&gt;
&lt;P&gt;snips from running config below:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
!
interface GigabitEthernet1/1
 nameif outside
 security-level 0
 ip address 71.xxx.xxx.xxx 255.255.255.0 

!
interface GigabitEthernet1/3
 nameif inside
 security-level 100
 ip address 10.10.99.1 255.255.255.0 
&lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
object network Corp
 subnet 172.16.0.0 255.255.0.0
 description Corporate segment&lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
object-group network DM_INLINE_NETWORK_1
 network-object 10.10.99.0 255.255.255.0&lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
access-list outside_cryptomap_1 extended permit ip object-group DM_INLINE_NETWORK_1 object Corp &lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
logging enable
logging timestamp
logging list EmailNotification level critical
logging trap notifications
logging asdm informational
logging mail EmailNotification
logging from-address H99fw@xxxxx.com
logging recipient-address fwmon@xxxxx.com level errors
logging device-id hostname
logging host inside 172.16.0.13&lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
nat (inside,outside) source static any any destination static Corp Corp no-proxy-arp route-lookup
&lt;/PRE&gt;

&lt;PRE style="color: rgb(0, 0, 0); line-height: normal;"&gt;
smtp-server 172.16.0.2&lt;/PRE&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any help is appreciated.&lt;/P&gt;
&lt;P&gt;Adding packet capture from outside interface with my ip xx'ed out:&lt;/P&gt;
&lt;P&gt;9 packets captured&lt;/P&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp;1: 09:32:59.280121 &amp;nbsp; &amp;nbsp; &amp;nbsp; 71.xxx.xxx.xxx.34977 &amp;gt; 172.16.0.2.25: S 1280585985:1280585985(0) win 32768 &amp;lt;mss 1460,nop,nop,timestamp 154282920 0&amp;gt;&lt;/P&gt;
&lt;P&gt;Packet capture for inside interface had nothing.&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 06:21:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-x-trying-to-email-syslog-alerts-through-site-to-site-vpn/m-p/2694716#M193188</guid>
      <dc:creator>Don Bonnice</dc:creator>
      <dc:date>2019-03-12T06:21:48Z</dc:date>
    </item>
    <item>
      <title>Hi Don,This link shall</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-x-trying-to-email-syslog-alerts-through-site-to-site-vpn/m-p/2694717#M193191</link>
      <description>&lt;P&gt;Hi Don,&lt;/P&gt;&lt;P&gt;This link shall address your query:-&lt;BR /&gt;&lt;STRONG&gt;How can I specify the ASA source interface for syslogs sent over a VPN tunneI&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116171-qanda-asa-00.html"&gt;http://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116171-qanda-asa-00.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;BR /&gt;&lt;BR /&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 15:58:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-x-trying-to-email-syslog-alerts-through-site-to-site-vpn/m-p/2694717#M193191</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2015-07-30T15:58:17Z</dc:date>
    </item>
    <item>
      <title>Dinesh, That works fine to</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-x-trying-to-email-syslog-alerts-through-site-to-site-vpn/m-p/2694718#M193194</link>
      <description>&lt;P&gt;Dinesh,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That works fine to send to a syslog server. I dont have a problem with that. I want specific emergency alerts to be sent via email where the email server is on the other end of a VPN.&lt;/P&gt;&lt;P&gt;Don&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 16:06:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-x-trying-to-email-syslog-alerts-through-site-to-site-vpn/m-p/2694718#M193194</guid>
      <dc:creator>Don Bonnice</dc:creator>
      <dc:date>2015-07-30T16:06:37Z</dc:date>
    </item>
    <item>
      <title>Here is the thread which</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-x-trying-to-email-syslog-alerts-through-site-to-site-vpn/m-p/2694719#M193197</link>
      <description>&lt;P&gt;Here is the thread which discusses this:-&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportforums.cisco.com/discussion/10971551/how-do-i-get-mail-alert-if-site-site-vpn-goes-down-asa-5510"&gt;https://supportforums.cisco.com/discussion/10971551/how-do-i-get-mail-alert-if-site-site-vpn-goes-down-asa-5510&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You might want to confirm the specific emergency alerts ID to configure on the ASA.&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;BR /&gt;Dinesh Moudgil&lt;/P&gt;&lt;P&gt;P.S. Please rate helpful posts.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 16:31:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-x-trying-to-email-syslog-alerts-through-site-to-site-vpn/m-p/2694719#M193197</guid>
      <dc:creator>Dinesh Moudgil</dc:creator>
      <dc:date>2015-07-30T16:31:52Z</dc:date>
    </item>
    <item>
      <title>I am sorry Dinesh but there</title>
      <link>https://community.cisco.com/t5/network-security/asa5506-x-trying-to-email-syslog-alerts-through-site-to-site-vpn/m-p/2694720#M193200</link>
      <description>&lt;P&gt;I am sorry Dinesh but there must be a lack of communications on my part.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My question is specifically directed at the interface used by the emailing of syslog alerts. It will not use my smtp server going through my VPN. It attempts to email... All that is fine. It is sending out the outside interface instead of using the server mapped via the inside interface. Please see original post.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2015 17:03:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5506-x-trying-to-email-syslog-alerts-through-site-to-site-vpn/m-p/2694720#M193200</guid>
      <dc:creator>Don Bonnice</dc:creator>
      <dc:date>2015-07-30T17:03:24Z</dc:date>
    </item>
  </channel>
</rss>

