<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic syslog outside traffic through firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/syslog-outside-traffic-through-firewall/m-p/2430365#M270368</link>
    <description>&lt;P&gt;I have question as to the best way to perform the task of sending syslog to my logging server on the inside of my network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a couple rotuers and a DMZ with some device in it that I need to collect log info from. I have a 5525X connected to external router and my Syslog server sits inside the ASA. If my syslog server is 192.168.20.71 UDP port 514, would I want to run straight through the firewall? Don't seem quite right to me to send internal IP traffic throught the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions how I'd perform this?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 03:39:45 GMT</pubDate>
    <dc:creator>k.langley</dc:creator>
    <dc:date>2019-03-12T03:39:45Z</dc:date>
    <item>
      <title>syslog outside traffic through firewall</title>
      <link>https://community.cisco.com/t5/network-security/syslog-outside-traffic-through-firewall/m-p/2430365#M270368</link>
      <description>&lt;P&gt;I have question as to the best way to perform the task of sending syslog to my logging server on the inside of my network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a couple rotuers and a DMZ with some device in it that I need to collect log info from. I have a 5525X connected to external router and my Syslog server sits inside the ASA. If my syslog server is 192.168.20.71 UDP port 514, would I want to run straight through the firewall? Don't seem quite right to me to send internal IP traffic throught the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any suggestions how I'd perform this?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:39:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-outside-traffic-through-firewall/m-p/2430365#M270368</guid>
      <dc:creator>k.langley</dc:creator>
      <dc:date>2019-03-12T03:39:45Z</dc:date>
    </item>
    <item>
      <title>syslog outside traffic through firewall</title>
      <link>https://community.cisco.com/t5/network-security/syslog-outside-traffic-through-firewall/m-p/2430366#M270372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you say you have a DMZ, is this a different interface on the ASA?&amp;nbsp; (So you would have Outside, Inside, and DMZ)?&amp;nbsp; If so, it is perfectly fine to send syslog traffic in the DMZ interface of the ASA and out the Inside.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You essentially want to take the most direct path to the syslog server (and the most secure).&amp;nbsp; If there are devices/networks between the logging device and the syslog server which you do not control, then you can always establish a VPN tunnel over the insecure network to get your logs securely back to your internal network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Feb 2014 02:24:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-outside-traffic-through-firewall/m-p/2430366#M270372</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2014-02-04T02:24:24Z</dc:date>
    </item>
  </channel>
</rss>

