<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Filter informational traffic. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/filter-informational-traffic/m-p/1925520#M437624</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you just want to have outbound connections being logged? That message wont work neither the build local-host. I dont think there is a way to do that. You can always submit a enhacement request to a Cisco Account manager. Thinking it a little bit you can try the following workaround:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; What you can do is to set an ACL with a normal permit IP any any with the log keyword at the end and place it on the Interface for example inside on the inbound direction. I will log every attempt to estalish a connection outbound the ASA, then you can set the logging level for that and send it to the syslog server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 07 May 2012 01:57:30 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2012-05-07T01:57:30Z</dc:date>
    <item>
      <title>Filter informational traffic.</title>
      <link>https://community.cisco.com/t5/network-security/filter-informational-traffic/m-p/1925519#M437623</link>
      <description>&lt;P&gt;Hi &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am sending the informational log,specifically the message id302013 of cisco ASA to syslog server. I am only concern about the built in message created from outside to inside direction. Is it possible through configuration so that I can only receive traffic in syslog sevrer that flow from outside to inside zone.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 23:02:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filter-informational-traffic/m-p/1925519#M437623</guid>
      <dc:creator>samarjit.das</dc:creator>
      <dc:date>2019-03-11T23:02:49Z</dc:date>
    </item>
    <item>
      <title>Filter informational traffic.</title>
      <link>https://community.cisco.com/t5/network-security/filter-informational-traffic/m-p/1925520#M437624</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you just want to have outbound connections being logged? That message wont work neither the build local-host. I dont think there is a way to do that. You can always submit a enhacement request to a Cisco Account manager. Thinking it a little bit you can try the following workaround:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; What you can do is to set an ACL with a normal permit IP any any with the log keyword at the end and place it on the Interface for example inside on the inbound direction. I will log every attempt to estalish a connection outbound the ASA, then you can set the logging level for that and send it to the syslog server. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 May 2012 01:57:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filter-informational-traffic/m-p/1925520#M437624</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-05-07T01:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: Filter informational traffic.</title>
      <link>https://community.cisco.com/t5/network-security/filter-informational-traffic/m-p/1925521#M437625</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to do so but I faced another problem. I set the log&amp;nbsp; keyword at the end of ACL that is being applied to outside zone&amp;nbsp; interface and configured FW to send only the message id 106100 to syslog&amp;nbsp; server but enabling log gives some irrelevant traffic log. It catches&amp;nbsp; the 1st response packet of traffic that is actually initiated from&amp;nbsp; inside to outside direction which ideally should not happen caz return&amp;nbsp; traffic goes via existing session. I have users in inside zone which&amp;nbsp; connect to proxy server in outside zone. In case of proxy, the&amp;nbsp; connection always bulit up by the user, not by the proxy server, but i&amp;nbsp; get traffic log for those packets also that is replied by proxy( source&amp;nbsp; port is known proxy port &amp;amp; destination ip is user's machine IP&amp;nbsp; address and port is always unknown destination port). To make sure&amp;nbsp; whether this packet initiated by the proxy server, I started capture log&amp;nbsp; for both message ids 106100 &amp;amp; 302013 and found none of the build in&amp;nbsp; message is generated after getting log for permitted message(getting&amp;nbsp; generated by106100).So in case build in message is not getting generating, it is not proxy initiated traffic. I don;t know what is going on. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 May 2012 05:34:40 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/filter-informational-traffic/m-p/1925521#M437625</guid>
      <dc:creator>samarjit.das</dc:creator>
      <dc:date>2012-05-07T05:34:40Z</dc:date>
    </item>
  </channel>
</rss>

