<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Tracking ASA rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tracking-asa-rules/m-p/1816104#M459947</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you proposed is for cisco routers, I am referring to ASA. The syslog entries have the following fields, but it does not show which rule it hits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 24 00:00:52 172.16.132.21 :Jan 23 23:49:07 SGT: %ASA-session-6-302013: Built inbound TCP connection 1158354 for CITRIX:x.x.x.x/60659 (x.x.x.x/60659) to Inside:x.x.x.x/445 (x.x.x.x/445)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 08 Feb 2012 10:42:20 GMT</pubDate>
    <dc:creator>benson.low</dc:creator>
    <dc:date>2012-02-08T10:42:20Z</dc:date>
    <item>
      <title>Tracking ASA rules</title>
      <link>https://community.cisco.com/t5/network-security/tracking-asa-rules/m-p/1816102#M459942</link>
      <description>&lt;P&gt;Hi CSC,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a way to extract which traffic is hitting which rule from syslog? Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rgrds,&lt;/P&gt;&lt;P&gt;Benson&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 22:25:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tracking-asa-rules/m-p/1816102#M459942</guid>
      <dc:creator>benson.low</dc:creator>
      <dc:date>2019-03-11T22:25:06Z</dc:date>
    </item>
    <item>
      <title>Tracking ASA rules</title>
      <link>https://community.cisco.com/t5/network-security/tracking-asa-rules/m-p/1816103#M459945</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can assing the keyword log at the end of the ACL and that will generate a syslog per rule match that it has this keyword at the end. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 07 Feb 2012 14:50:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tracking-asa-rules/m-p/1816103#M459945</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-02-07T14:50:42Z</dc:date>
    </item>
    <item>
      <title>Tracking ASA rules</title>
      <link>https://community.cisco.com/t5/network-security/tracking-asa-rules/m-p/1816104#M459947</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What you proposed is for cisco routers, I am referring to ASA. The syslog entries have the following fields, but it does not show which rule it hits.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Jan 24 00:00:52 172.16.132.21 :Jan 23 23:49:07 SGT: %ASA-session-6-302013: Built inbound TCP connection 1158354 for CITRIX:x.x.x.x/60659 (x.x.x.x/60659) to Inside:x.x.x.x/445 (x.x.x.x/445)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 10:42:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tracking-asa-rules/m-p/1816104#M459947</guid>
      <dc:creator>benson.low</dc:creator>
      <dc:date>2012-02-08T10:42:20Z</dc:date>
    </item>
    <item>
      <title>Tracking ASA rules</title>
      <link>https://community.cisco.com/t5/network-security/tracking-asa-rules/m-p/1816105#M459949</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Extract from &lt;STRONG&gt;CISCO ASA COMMAND REFERENCE 8.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;H3&gt;Syntax Description&lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE border="1" cellpadding="3" cellspacing="0" id="wp1559456table1559454" style="width: 80%;"&gt;&lt;TBODY&gt;&lt;TR align="left" valign="top"&gt;&lt;TD&gt;&lt;P&gt; &lt;STRONG&gt;log&lt;/STRONG&gt; &lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;A name="wp1559511"&gt;&lt;/A&gt;&lt;P&gt; (Optional) Sets logging options when a &lt;STRONG&gt;ACE&lt;/STRONG&gt; matches a packet for network access (an access list applied with the &lt;STRONG&gt;access-group&lt;/STRONG&gt; command). If you enter the &lt;STRONG&gt;log&lt;/STRONG&gt; keyword without any arguments, you enable system log message 106100 at&amp;nbsp; the default level (6) and for the default interval (300 seconds). If you&amp;nbsp; do not enter the &lt;STRONG&gt;log&lt;/STRONG&gt; keyword, then the default system log message 106023 is generated. &lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/a1.html#wp1559450"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/command/reference/a1.html#wp1559450&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Extract from&lt;STRONG&gt; Cisco ASA 5500 Series System Log Messages, 8.2&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Log message: 106100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE&gt;Error Message&amp;nbsp;&amp;nbsp;&amp;nbsp; %ASA-6-106100: access-list &lt;EM&gt;acl_ID&lt;/EM&gt; {permitted | denied | est-allowed}&lt;EM&gt; 
protocol&lt;/EM&gt; &lt;EM&gt;interface_name&lt;/EM&gt;/&lt;EM&gt;source_address&lt;/EM&gt;(&lt;EM&gt;source_port&lt;/EM&gt;) - 
&lt;EM&gt;interface_name&lt;/EM&gt;/&lt;EM&gt;dest_address&lt;/EM&gt;(&lt;EM&gt;dest_port&lt;/EM&gt;) hit-cnt &lt;EM&gt;number&lt;/EM&gt; ({first hit | 
&lt;EM&gt;number&lt;/EM&gt;-second interval}) hash codes
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;A name="wp6002882"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;When an access-list &lt;STRONG&gt;line has the log argument,&lt;/STRONG&gt; it is expected that this syslog ID might be triggered because&amp;nbsp; of a non-synchronized packet reaching the adaptive security appliance&amp;nbsp; and being evaluated by the access-list. For example, if an ACK packet is&amp;nbsp; received on the adaptive security appliance (for which no TCP&amp;nbsp; connection exists in the connection table), the device might generate&amp;nbsp; syslog 106100, indicating that the packet was permitted; however, the&amp;nbsp; packet is later correctly dropped because of no matching connection. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are in doubts, please ask first. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 08 Feb 2012 15:26:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tracking-asa-rules/m-p/1816105#M459949</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2012-02-08T15:26:39Z</dc:date>
    </item>
    <item>
      <title>Tracking ASA rules</title>
      <link>https://community.cisco.com/t5/network-security/tracking-asa-rules/m-p/1816106#M459951</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Mike,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, it does help to solve part1. Now I am stuck with another issue, the moment the log keyword is entered for 1 ACE, no more syslog is being generated.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 06:45:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tracking-asa-rules/m-p/1816106#M459951</guid>
      <dc:creator>benson.low</dc:creator>
      <dc:date>2012-02-09T06:45:39Z</dc:date>
    </item>
  </channel>
</rss>

