<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PIX syslog in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-syslog/m-p/1059399#M493340</link>
    <description>&lt;P&gt;Can someone suggest a good combination of application + syslog server to be able to receive syslog messages from a PIX firewall (v 6.3(4)) and produce understandable, layman report on what the messages mean? I'd like to find out things like 'why the firewall blocked this/that service' but simply does not have the time to sit there and go through thousands of messages. Hopefully the application would be able to let me select things such as source/dest addresses. Thanks.&lt;/P&gt;</description>
    <pubDate>Fri, 21 Feb 2020 11:06:03 GMT</pubDate>
    <dc:creator>vincent-n</dc:creator>
    <dc:date>2020-02-21T11:06:03Z</dc:date>
    <item>
      <title>PIX syslog</title>
      <link>https://community.cisco.com/t5/network-security/pix-syslog/m-p/1059399#M493340</link>
      <description>&lt;P&gt;Can someone suggest a good combination of application + syslog server to be able to receive syslog messages from a PIX firewall (v 6.3(4)) and produce understandable, layman report on what the messages mean? I'd like to find out things like 'why the firewall blocked this/that service' but simply does not have the time to sit there and go through thousands of messages. Hopefully the application would be able to let me select things such as source/dest addresses. Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:06:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-syslog/m-p/1059399#M493340</guid>
      <dc:creator>vincent-n</dc:creator>
      <dc:date>2020-02-21T11:06:03Z</dc:date>
    </item>
    <item>
      <title>Re: PIX syslog</title>
      <link>https://community.cisco.com/t5/network-security/pix-syslog/m-p/1059400#M493341</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Check out &lt;A class="jive-link-custom" href="http://www.sawmill.net/" target="_blank"&gt;http://www.sawmill.net/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are many others, google &lt;B&gt;firewall log analysis&lt;/B&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Nov 2008 18:25:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-syslog/m-p/1059400#M493341</guid>
      <dc:creator>Collin Clark</dc:creator>
      <dc:date>2008-11-13T18:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: PIX syslog</title>
      <link>https://community.cisco.com/t5/network-security/pix-syslog/m-p/1059401#M493342</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Take a look at splunk.  There is a free version if you want to try it out.  &lt;A class="jive-link-custom" href="http://www.splunk.com" target="_blank"&gt;http://www.splunk.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 14 Nov 2008 19:54:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-syslog/m-p/1059401#M493342</guid>
      <dc:creator>mike.keller</dc:creator>
      <dc:date>2008-11-14T19:54:19Z</dc:date>
    </item>
  </channel>
</rss>

