<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA ACL Questions in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-acl-questions/m-p/2471811#M270038</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest considering adding a &lt;STRONG&gt;"log"&lt;/STRONG&gt; keyword to the &lt;STRONG&gt;"permit ip any any"&lt;/STRONG&gt; rule you have and setting the logging level you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the explanation of the &lt;STRONG&gt;"log"&lt;/STRONG&gt; parameter at the end of &lt;STRONG&gt;"access-list"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1610428table1609330" width="80%"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt; &lt;STRONG&gt;log&lt;/STRONG&gt; &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1610525"&gt;&lt;/A&gt;&lt;P&gt; (Optional) Sets logging options when a &lt;STRONG&gt;ACE&lt;/STRONG&gt; matches a packet for network access (an ACL applied with the &lt;STRONG&gt;access-group&lt;/STRONG&gt; command). If you enter the &lt;STRONG&gt;log&lt;/STRONG&gt; keyword without any arguments, you enable system log message 106100 at&amp;nbsp; the default level (6) and for the default interval (300 seconds). If you&amp;nbsp; do not enter the &lt;STRONG&gt;log&lt;/STRONG&gt; keyword, then the default system log message 106023 is generated. &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you might have to play around with the&lt;STRONG&gt; "interval"&lt;/STRONG&gt; value perhaps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source from Command Reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/command-reference/a1.html#wp1598407"&gt;http://www.cisco.com/en/US/docs/security/asa/command-reference/a1.html#wp1598407&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding if you have a &lt;STRONG&gt;"permit"&lt;/STRONG&gt; line in the ACL then usually no log messages are generated at all for traffic/connections matching these rules. The &lt;STRONG&gt;"deny"&lt;/STRONG&gt; rules however generate Notifications level messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since using the&lt;STRONG&gt; "log"&lt;/STRONG&gt; parameter at the end of this &lt;STRONG&gt;"permit ip any any"&lt;/STRONG&gt; rule will generate Syslog messages with a specific Syslog ID mentioned above, you could only have this&lt;STRONG&gt; "log"&lt;/STRONG&gt; enabled on that single ACL and single rule of that ACL and log messages to a Syslog server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could then later gather the information and filter/parse the mentioned Syslog ID messages from that log. You could then further parse that log for the things that need to stay open and require their own rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally there is probably tools that would also handle this but I havent had the change to work with any &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am wondering if any of the allowed traffic is outbound to Internet? I'd imagine this might cause problems to go through. Then again this kind of traffic could be allowed perhaps &lt;STRONG&gt;"permit tcp any any eq &lt;PORT required=""&gt;"&lt;/PORT&gt;&lt;/STRONG&gt; to allow the basic services outbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 07 Feb 2014 20:07:36 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-02-07T20:07:36Z</dc:date>
    <item>
      <title>ASA ACL Questions</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-questions/m-p/2471810#M270036</link>
      <description>&lt;P&gt;Hello everyone-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have an ASA-5585-SSP-10 that I have subinterfaces and VLANs created on. I used this ASA to firewall the vlans downstream on our Catalyst 4k's. Most all of my interfaces have specific ACLs in for the necessary traffic and all is good. I have a couple interfaces that have an IP any-any in and I would like to remove the any-any, but do not want to do so immediately, as the ACL has thousands of hits. I have cleared the ACL hit counter, but would like to know how I determine what traffic (source, dest, etc) is hitting the any-any so I can build specific ACLs to match, and ultimately remove the any-any. I have reviewed the log for a specific any-any, but this has not turned out to be helpful. Can anyone give me some help?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:42:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-questions/m-p/2471810#M270036</guid>
      <dc:creator>arrayservices</dc:creator>
      <dc:date>2019-03-12T03:42:33Z</dc:date>
    </item>
    <item>
      <title>ASA ACL Questions</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-questions/m-p/2471811#M270038</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest considering adding a &lt;STRONG&gt;"log"&lt;/STRONG&gt; keyword to the &lt;STRONG&gt;"permit ip any any"&lt;/STRONG&gt; rule you have and setting the logging level you want.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here is the explanation of the &lt;STRONG&gt;"log"&lt;/STRONG&gt; parameter at the end of &lt;STRONG&gt;"access-list"&lt;/STRONG&gt; command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1610428table1609330" width="80%"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt; &lt;STRONG&gt;log&lt;/STRONG&gt; &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1610525"&gt;&lt;/A&gt;&lt;P&gt; (Optional) Sets logging options when a &lt;STRONG&gt;ACE&lt;/STRONG&gt; matches a packet for network access (an ACL applied with the &lt;STRONG&gt;access-group&lt;/STRONG&gt; command). If you enter the &lt;STRONG&gt;log&lt;/STRONG&gt; keyword without any arguments, you enable system log message 106100 at&amp;nbsp; the default level (6) and for the default interval (300 seconds). If you&amp;nbsp; do not enter the &lt;STRONG&gt;log&lt;/STRONG&gt; keyword, then the default system log message 106023 is generated. &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you might have to play around with the&lt;STRONG&gt; "interval"&lt;/STRONG&gt; value perhaps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Source from Command Reference:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/command-reference/a1.html#wp1598407"&gt;http://www.cisco.com/en/US/docs/security/asa/command-reference/a1.html#wp1598407&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding if you have a &lt;STRONG&gt;"permit"&lt;/STRONG&gt; line in the ACL then usually no log messages are generated at all for traffic/connections matching these rules. The &lt;STRONG&gt;"deny"&lt;/STRONG&gt; rules however generate Notifications level messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since using the&lt;STRONG&gt; "log"&lt;/STRONG&gt; parameter at the end of this &lt;STRONG&gt;"permit ip any any"&lt;/STRONG&gt; rule will generate Syslog messages with a specific Syslog ID mentioned above, you could only have this&lt;STRONG&gt; "log"&lt;/STRONG&gt; enabled on that single ACL and single rule of that ACL and log messages to a Syslog server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You could then later gather the information and filter/parse the mentioned Syslog ID messages from that log. You could then further parse that log for the things that need to stay open and require their own rules.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally there is probably tools that would also handle this but I havent had the change to work with any &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am wondering if any of the allowed traffic is outbound to Internet? I'd imagine this might cause problems to go through. Then again this kind of traffic could be allowed perhaps &lt;STRONG&gt;"permit tcp any any eq &lt;PORT required=""&gt;"&lt;/PORT&gt;&lt;/STRONG&gt; to allow the basic services outbound.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2014 20:07:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-questions/m-p/2471811#M270038</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-02-07T20:07:36Z</dc:date>
    </item>
    <item>
      <title>ASA ACL Questions</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-questions/m-p/2471812#M270042</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Jouni-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;How would you recommend I allow Intenet access outbound using ACLs in the ASA, without the any-any. We do not proxy to our web filter appliance, we have a Juniper firewall (external) which redirects 80 and 443 traffic to the web filter, it then send Internet traffic out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Brian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 07 Feb 2014 22:32:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-questions/m-p/2471812#M270042</guid>
      <dc:creator>arrayservices</dc:creator>
      <dc:date>2014-02-07T22:32:48Z</dc:date>
    </item>
  </channel>
</rss>

