<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Find TCP Connection destination in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/find-tcp-connection-destination/m-p/2404402#M271549</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great to hear its working &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah its an important log that I also like to keep logged to our Syslog servers. Helps with a lot of troubleshooting situations especially in cases where the users report about the problem after its already passed. Usually get somekind of picture about a possible cause from the "Teardown" log messages for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally it also helps with confirming if certain connections have been formed through the firewall as you mention.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 15 Jan 2014 14:22:36 GMT</pubDate>
    <dc:creator>Jouni Forss</dc:creator>
    <dc:date>2014-01-15T14:22:36Z</dc:date>
    <item>
      <title>Find TCP Connection destination</title>
      <link>https://community.cisco.com/t5/network-security/find-tcp-connection-destination/m-p/2404399#M271539</link>
      <description>&lt;P&gt;I recently updated ASA 5510 from V8.0 to V9.1.&amp;nbsp; In 8.0 I had elevated the severity of event 302013 so ASA sent it to syslog.&amp;nbsp; It gave me inside and outside IP addresses of every TCP connection.&amp;nbsp; When the IPS called, said an inside user was infected and trying to send to an evil web server, but IPS knew only ASA's outside address, I used the syslog to track down the offending inside address by its logged TCP connection.&amp;nbsp; On V9.1 I'm seeing event 305011 building a TCP connection, but I see only the port, not the IP address of the destination.&amp;nbsp; Will anything in V9.1 log for me both&amp;nbsp; the inside and outside addresses of every connection?&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 03:29:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/find-tcp-connection-destination/m-p/2404399#M271539</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2019-03-12T03:29:55Z</dc:date>
    </item>
    <item>
      <title>Find TCP Connection destination</title>
      <link>https://community.cisco.com/t5/network-security/find-tcp-connection-destination/m-p/2404400#M271545</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the basic syslog IDs should be there still no matter which software level you are using.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The Syslog &lt;STRONG&gt;ID 305011&lt;/STRONG&gt; seems to be a message for when a translation is built for the actual connection on the ASA. So it doesnt give the information about the actual connection specifically.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;On its basic setting it should be able to get the connection &lt;STRONG&gt;Built/Teardown&lt;/STRONG&gt; messages to show with the &lt;STRONG&gt;Informational (level 6) &lt;/STRONG&gt;logging level or otherwise manipulating the logging levels.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Are you sure that the Syslog ID has not been disabled for some reason by someone?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does your logging configuration output of &lt;STRONG&gt;"show run logging"&lt;/STRONG&gt; indicate that any Syslog ID would have been disabled or any Syslog IDs level would have been changed to something else than its supposed to be?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Jan 2014 23:09:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/find-tcp-connection-destination/m-p/2404400#M271545</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-14T23:09:25Z</dc:date>
    </item>
    <item>
      <title>Find TCP Connection destination</title>
      <link>https://community.cisco.com/t5/network-security/find-tcp-connection-destination/m-p/2404401#M271548</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; The ASDM syslog info showed ID 302013 still set to Errors, not disabled.&amp;nbsp; But a sho run log showed:&lt;/P&gt;&lt;P&gt;no logging message 106015&lt;/P&gt;&lt;P&gt;no logging message 313001&lt;/P&gt;&lt;P&gt;no logging message 313008&lt;/P&gt;&lt;P&gt;no logging message 106023&lt;/P&gt;&lt;P&gt;no logging message 710003&lt;/P&gt;&lt;P&gt;no logging message 302015&lt;/P&gt;&lt;P&gt;no logging message 302014&lt;/P&gt;&lt;P&gt;no logging message 302013&lt;/P&gt;&lt;P&gt;no logging message 302018&lt;/P&gt;&lt;P&gt;no logging message 302017&lt;/P&gt;&lt;P&gt;no logging message 302016&lt;/P&gt;&lt;P&gt;no logging message 302021&lt;/P&gt;&lt;P&gt;no logging message 302020&lt;/P&gt;&lt;P&gt;logging message 713120 level errors&lt;/P&gt;&lt;P&gt;logging message 722022 level errors&lt;/P&gt;&lt;P&gt;logging message 722023 level errors&lt;/P&gt;&lt;P&gt;logging message 713050 level errors&lt;/P&gt;&lt;P&gt;logging message 302013 level errors&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I must guess the 8.0-to-9.1 updater guys did a command line disable that the ASDM somehow did not pick up.&lt;/P&gt;&lt;P&gt;So I did a command-line "logging message 302013" and now i see them again syslogged.&amp;nbsp; I know it's lots of logging, but it's critically important when I get those calls from the IPS monitors that something is happening inside my network and trying to get out.&amp;nbsp;&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2014 14:17:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/find-tcp-connection-destination/m-p/2404401#M271548</guid>
      <dc:creator>mcmurphytoo</dc:creator>
      <dc:date>2014-01-15T14:17:17Z</dc:date>
    </item>
    <item>
      <title>Find TCP Connection destination</title>
      <link>https://community.cisco.com/t5/network-security/find-tcp-connection-destination/m-p/2404402#M271549</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Great to hear its working &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yeah its an important log that I also like to keep logged to our Syslog servers. Helps with a lot of troubleshooting situations especially in cases where the users report about the problem after its already passed. Usually get somekind of picture about a possible cause from the "Teardown" log messages for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally it also helps with confirming if certain connections have been formed through the firewall as you mention.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2014 14:22:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/find-tcp-connection-destination/m-p/2404402#M271549</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-15T14:22:36Z</dc:date>
    </item>
    <item>
      <title>Find TCP Connection destination</title>
      <link>https://community.cisco.com/t5/network-security/find-tcp-connection-destination/m-p/2404403#M271550</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Also,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In situations such as yours I tend to always configure traffic capture on the ASA to capture this traffic and go through the capture every now and then in addition to monitoring the logs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The ASA can hold a 33,5MB buffer of captured data in a single capture. Naturally if you dont capture the actual data contained in the packet you can get more traffic captured and see whats been happening.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you need any example configurations/commands to take a capture directly on the ASA (and then later open it on your own computer with Wireshark) then let me know.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 15 Jan 2014 14:25:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/find-tcp-connection-destination/m-p/2404403#M271550</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2014-01-15T14:25:00Z</dc:date>
    </item>
  </channel>
</rss>

