<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Logging for a specific ACL line in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/logging-for-a-specific-acl-line/m-p/2660251#M196895</link>
    <description>&lt;P&gt;Hello, I'm currently evaluating rules on ASA.&lt;/P&gt;&lt;P&gt;There are some rules applied, but some of the traffic does not match those rules. I created a rule allowing everything and I need to see what traffic is hitting this especific rule on line 3.&lt;/P&gt;&lt;P&gt;Example:&lt;BR /&gt;access-list OUTSIDE_IN line 1 extended permit tcp 10.1.16.0 255.255.255.0 10.153.224.0 255.255.240.0 eq 88&lt;BR /&gt;access-list OUTSIDE_IN line 2 extended permit udp 10.1.16.0 255.255.255.0 10.153.224.0 255.255.240.0 eq domain&lt;BR /&gt;access-list OUTSIDE_IN line 3 extended permit ip 10.1.16.0 255.255.255.0 10.153.224.0 255.255.240.0 log informational&lt;/P&gt;&lt;P&gt;When I enable log, I see all the traffic, not the only one I wanted. There's a way to see only traffic coming on line 3?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 05:32:02 GMT</pubDate>
    <dc:creator>marcos.sousa7</dc:creator>
    <dc:date>2019-03-12T05:32:02Z</dc:date>
    <item>
      <title>Logging for a specific ACL line</title>
      <link>https://community.cisco.com/t5/network-security/logging-for-a-specific-acl-line/m-p/2660251#M196895</link>
      <description>&lt;P&gt;Hello, I'm currently evaluating rules on ASA.&lt;/P&gt;&lt;P&gt;There are some rules applied, but some of the traffic does not match those rules. I created a rule allowing everything and I need to see what traffic is hitting this especific rule on line 3.&lt;/P&gt;&lt;P&gt;Example:&lt;BR /&gt;access-list OUTSIDE_IN line 1 extended permit tcp 10.1.16.0 255.255.255.0 10.153.224.0 255.255.240.0 eq 88&lt;BR /&gt;access-list OUTSIDE_IN line 2 extended permit udp 10.1.16.0 255.255.255.0 10.153.224.0 255.255.240.0 eq domain&lt;BR /&gt;access-list OUTSIDE_IN line 3 extended permit ip 10.1.16.0 255.255.255.0 10.153.224.0 255.255.240.0 log informational&lt;/P&gt;&lt;P&gt;When I enable log, I see all the traffic, not the only one I wanted. There's a way to see only traffic coming on line 3?&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 05:32:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-for-a-specific-acl-line/m-p/2660251#M196895</guid>
      <dc:creator>marcos.sousa7</dc:creator>
      <dc:date>2019-03-12T05:32:02Z</dc:date>
    </item>
    <item>
      <title>Hi Marcos,</title>
      <link>https://community.cisco.com/t5/network-security/logging-for-a-specific-acl-line/m-p/2660252#M196896</link>
      <description>&lt;P&gt;Hi Marcos,&lt;/P&gt;
&lt;P&gt;You see all traffic because for lines for which no "log" keyword at ACL line end is added, it will still be logged, see:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/asa/asa81/command/ref/refgd/a1.html#wp1564948"&gt;http://www.cisco.com/c/en/us/td/docs/security/asa/asa81/command/ref/refgd/a1.html#wp1564948&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;... If you enter the &lt;B class="cBold"&gt;log&lt;/B&gt; keyword without any arguments, you enable system log message 106100 at the default level (6) and for the default interval (300 seconds). &lt;U&gt;If you do not enter the &lt;B class="cBold"&gt;log&lt;/B&gt; keyword&lt;/U&gt;, then the default system log message 106023 is generated...&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;So what you can do is instead of "log informatioanl", put "log warnings" to log this ACL line 3 at syslog level 4 (warnings), and in addition to that decrease logging level that is visible for the method how you monitor logs, for example some of following lines (depending whether you monitor logs at syslog server, terminal, or from local buffer (show logg command):&lt;/P&gt;

&lt;PRE&gt;
hostname(config)# &lt;B class="cBold"&gt;logging trap warnings&lt;/B&gt;&lt;/PRE&gt;

&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE&gt;
hostname(config)# &lt;B class="cBold"&gt;logging enable
&lt;/B&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE&gt;
hostname(config)# &lt;B class="cBold"&gt;logging monitor warnings&lt;/B&gt;&lt;/PRE&gt;
&lt;/DIV&gt;
&lt;DIV class="pEx1_Example1"&gt;
&lt;PRE&gt;
hostname(config)# &lt;B class="cCN_CmdName"&gt;terminal monitor
&lt;/B&gt;&lt;/PRE&gt;
&lt;/DIV&gt;

&lt;PRE&gt;
hostname(config)# &lt;B class="cBold"&gt;logging buffered warnings&lt;/B&gt;&lt;/PRE&gt;

&lt;P&gt;Also, before any significant changes to ASA configuration, migrations, software upgrades, etc., I always recommend testing the configuration with fw123test:&lt;/P&gt;
&lt;P&gt;&lt;A href="http://www.networksea.com/fw123test/"&gt;http://www.networksea.com/fw123test/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;BR,&lt;/P&gt;
&lt;P&gt;Milan&lt;/P&gt;</description>
      <pubDate>Sun, 22 Feb 2015 18:12:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-for-a-specific-acl-line/m-p/2660252#M196896</guid>
      <dc:creator>Milan Mesic</dc:creator>
      <dc:date>2015-02-22T18:12:53Z</dc:date>
    </item>
  </channel>
</rss>

