<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Syslog for logging all packet flow from DMZ to Inside. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/syslog-for-logging-all-packet-flow-from-dmz-to-inside/m-p/1787619#M494233</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be the same as the others, but at the end you put the "headers-only" keywords at the end. The limitation again would be the buffer of the ASA for packet capturing. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to browse the following document, let me know if it works for you &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-17814"&gt;https://supportforums.cisco.com/docs/DOC-17814&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS, I would still go for SPAN on the switch &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 03 Nov 2011 08:36:43 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2011-11-03T08:36:43Z</dc:date>
    <item>
      <title>Syslog for logging all packet flow from DMZ to Inside.</title>
      <link>https://community.cisco.com/t5/network-security/syslog-for-logging-all-packet-flow-from-dmz-to-inside/m-p/1787616#M494220</link>
      <description>&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been trying to figure out a way to log all packet flow originating from the DMZ segment to our Inside network. There are multiple ways I came across through which this could be achieved.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) Through the ASDM packet capture wizard - Problem with this...I need the packet flow details covering 2 days. This cant be acheived through the wizard moreover it will increase the CPU utilization of the firewall.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) Enabling Informational logging at the end of the ACE for DMZ to Inside - Problem....my syslog would not show any hits. Guess I need to enable Debugging mode but wont this increase the CPU?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apart from the above methods is there a way to achieve my requirement without causing CPU hike?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:45:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-for-logging-all-packet-flow-from-dmz-to-inside/m-p/1787616#M494220</guid>
      <dc:creator>Sundeep Dsouza</dc:creator>
      <dc:date>2019-03-11T21:45:26Z</dc:date>
    </item>
    <item>
      <title>Syslog for logging all packet flow from DMZ to Inside.</title>
      <link>https://community.cisco.com/t5/network-security/syslog-for-logging-all-packet-flow-from-dmz-to-inside/m-p/1787617#M494224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wouldnt recomment using the ASA to do this, if it is goin to be for two days. I bet that the ASA wont have that much buffer for that period of time (unless you only capture the headers only and not the payload) I think it would be better if you do it using SPAN on the switch port that connects to the ASA on the DMZ interface, connect a computer, run wireshark and leave it like that for two days. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The capture on the ASA is mainly to analyze specific types of connections. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Rojas &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Nov 2011 23:11:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-for-logging-all-packet-flow-from-dmz-to-inside/m-p/1787617#M494224</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-11-02T23:11:25Z</dc:date>
    </item>
    <item>
      <title>Syslog for logging all packet flow from DMZ to Inside.</title>
      <link>https://community.cisco.com/t5/network-security/syslog-for-logging-all-packet-flow-from-dmz-to-inside/m-p/1787618#M494229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Maykol,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our main requirement is to check what ports are used from the DMZ to the Inside network. Once we gather that information we can restrict access using ACE. I guess the header information will suffice as it would provide me port information.&lt;/P&gt;&lt;P&gt;Can you suggest how I can capture packets containing header information?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2011 08:24:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-for-logging-all-packet-flow-from-dmz-to-inside/m-p/1787618#M494229</guid>
      <dc:creator>Sundeep Dsouza</dc:creator>
      <dc:date>2011-11-03T08:24:23Z</dc:date>
    </item>
    <item>
      <title>Syslog for logging all packet flow from DMZ to Inside.</title>
      <link>https://community.cisco.com/t5/network-security/syslog-for-logging-all-packet-flow-from-dmz-to-inside/m-p/1787619#M494233</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It would be the same as the others, but at the end you put the "headers-only" keywords at the end. The limitation again would be the buffer of the ASA for packet capturing. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feel free to browse the following document, let me know if it works for you &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-wiki-small" href="https://community.cisco.com/docs/DOC-17814"&gt;https://supportforums.cisco.com/docs/DOC-17814&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PS, I would still go for SPAN on the switch &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 03 Nov 2011 08:36:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/syslog-for-logging-all-packet-flow-from-dmz-to-inside/m-p/1787619#M494233</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-11-03T08:36:43Z</dc:date>
    </item>
  </channel>
</rss>

