<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Dechiper ASA ACL Hex ID in Syslog in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/dechiper-asa-acl-hex-id-in-syslog/m-p/831606#M421271</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found out how to do it.  Here it is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So let's say a system administrator comes to me and says â&amp;#128;&amp;#156;I have a new server that needs to send print jobs to a print queue and it's not working.  My old server is working though.â&amp;#128;&amp;#157;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I want to know is, â&amp;#128;&amp;#156;What is the rule that allows the old server to work?â&amp;#128;&amp;#157; so I can add the new server to that rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I look through my syslog server for the â&amp;#128;&amp;#156;old serverâ&amp;#128;&amp;#157; which has the ip address of 10.10.30.101, I find this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;&amp;#156;%ASA-3-106100: access-list IN_ACL permitted tcp Inside_VLAN/10.10.30.101(4172) -&amp;gt; Outside_VLAN/192.168.69.61(9100) hit-cnt 1 first hit [0xa00e0f20, 0xb4d3bb50]â&amp;#128;&amp;#157;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So now I know the ACL line with the hex id â&amp;#128;&amp;#156;0xa00e0f20â&amp;#128;&amp;#157; is the line that allowed the packet through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I go to my firewall and run the command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;&amp;#156;show access-list | include 0xa00e0f20â&amp;#128;&amp;#157;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I get the following output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;&amp;#156;access-list IN_ACL line 2 extended permit tcp object-group PRINT_SERVERS object-group ALL_PRINTERS object-group PRINTING_SERVICES log errors interval 300 0xa00e0f20â&amp;#128;&amp;#157;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I now know that IN_ACL line 2 permitted the traffic and I know that I need to add the new server to the PRINT_SERVERS object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternatively, using the second hex id, you can find the actual ACE that permitted the traffic too:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FIREWALL#show access-list | include 0xb4d3bb50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list IN_ACL line 2 extended permit tcp host 10.10.30.101 192.168.69.0 255.255.255.0 eq 9100 log errors interval 300 (hitcnt=17803762) 0xb4d3bb50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this method, you can have many ACL lines and still locate the exact line that is permitting or denying traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 09 Nov 2007 17:18:14 GMT</pubDate>
    <dc:creator>scottpickett</dc:creator>
    <dc:date>2007-11-09T17:18:14Z</dc:date>
    <item>
      <title>Dechiper ASA ACL Hex ID in Syslog</title>
      <link>https://community.cisco.com/t5/network-security/dechiper-asa-acl-hex-id-in-syslog/m-p/831603#M421268</link>
      <description>&lt;P&gt;There is a hex id in ASA syslogs that corresponds to which ACL or ACE line generated the log entry.  I know that ADSM uses it, but I want to know how to decipher it for use with other apps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone figure it out?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See examples below:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;%ASA-3-106100: access-list OUTSIDE permitted tcp Outside_VLAN_240/192.168.1.1(1165) -&amp;gt; Inside_VLAN_248/SERVER1(80) hit-cnt 1 first hit [0xf2412831, 0xc45cf9c2]&lt;/P&gt;&lt;P&gt;%ASA-3-106100: access-list OUTSIDE permitted tcp Outside_VLAN_240/192.168.1.2(1503) -&amp;gt; Inside_VLAN_248/SERVER2(8008) hit-cnt 1 first hit [0x83e69c8, 0xee877a0]&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:45:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dechiper-asa-acl-hex-id-in-syslog/m-p/831603#M421268</guid>
      <dc:creator>scottpickett</dc:creator>
      <dc:date>2020-02-21T09:45:05Z</dc:date>
    </item>
    <item>
      <title>Re: Dechiper ASA ACL Hex ID in Syslog</title>
      <link>https://community.cisco.com/t5/network-security/dechiper-asa-acl-hex-id-in-syslog/m-p/831604#M421269</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the syslog entry, there are two hashes.  The first one points to the configured ACE which is the ACE that appears in the "show running-config" output.  The second one points to the ACE that is expanded if the configured ACE uses object groups.  It will be "0x0" if the ACE does not use object groups. But still it won't be possible to use this with some other application.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2007 18:07:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dechiper-asa-acl-hex-id-in-syslog/m-p/831604#M421269</guid>
      <dc:creator>tstanik</dc:creator>
      <dc:date>2007-11-05T18:07:58Z</dc:date>
    </item>
    <item>
      <title>Re: Dechiper ASA ACL Hex ID in Syslog</title>
      <link>https://community.cisco.com/t5/network-security/dechiper-asa-acl-hex-id-in-syslog/m-p/831605#M421270</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What I mean by other apps is a log viewer and I would like to know which ACL or ACE put the entry in the log?  There is no way to do this you think?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2007 05:51:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dechiper-asa-acl-hex-id-in-syslog/m-p/831605#M421270</guid>
      <dc:creator>scottpickett</dc:creator>
      <dc:date>2007-11-06T05:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: Dechiper ASA ACL Hex ID in Syslog</title>
      <link>https://community.cisco.com/t5/network-security/dechiper-asa-acl-hex-id-in-syslog/m-p/831606#M421271</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I found out how to do it.  Here it is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So let's say a system administrator comes to me and says â&amp;#128;&amp;#156;I have a new server that needs to send print jobs to a print queue and it's not working.  My old server is working though.â&amp;#128;&amp;#157;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I want to know is, â&amp;#128;&amp;#156;What is the rule that allows the old server to work?â&amp;#128;&amp;#157; so I can add the new server to that rule.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I look through my syslog server for the â&amp;#128;&amp;#156;old serverâ&amp;#128;&amp;#157; which has the ip address of 10.10.30.101, I find this:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;&amp;#156;%ASA-3-106100: access-list IN_ACL permitted tcp Inside_VLAN/10.10.30.101(4172) -&amp;gt; Outside_VLAN/192.168.69.61(9100) hit-cnt 1 first hit [0xa00e0f20, 0xb4d3bb50]â&amp;#128;&amp;#157;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So now I know the ACL line with the hex id â&amp;#128;&amp;#156;0xa00e0f20â&amp;#128;&amp;#157; is the line that allowed the packet through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I go to my firewall and run the command:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;&amp;#156;show access-list | include 0xa00e0f20â&amp;#128;&amp;#157;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I get the following output:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;â&amp;#128;&amp;#156;access-list IN_ACL line 2 extended permit tcp object-group PRINT_SERVERS object-group ALL_PRINTERS object-group PRINTING_SERVICES log errors interval 300 0xa00e0f20â&amp;#128;&amp;#157;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I now know that IN_ACL line 2 permitted the traffic and I know that I need to add the new server to the PRINT_SERVERS object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternatively, using the second hex id, you can find the actual ACE that permitted the traffic too:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FIREWALL#show access-list | include 0xb4d3bb50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list IN_ACL line 2 extended permit tcp host 10.10.30.101 192.168.69.0 255.255.255.0 eq 9100 log errors interval 300 (hitcnt=17803762) 0xb4d3bb50&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With this method, you can have many ACL lines and still locate the exact line that is permitting or denying traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Nov 2007 17:18:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/dechiper-asa-acl-hex-id-in-syslog/m-p/831606#M421271</guid>
      <dc:creator>scottpickett</dc:creator>
      <dc:date>2007-11-09T17:18:14Z</dc:date>
    </item>
  </channel>
</rss>

