<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Logging an ACL ACE in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/logging-an-acl-ace/m-p/1784292#M496635</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Figured this out folks.&amp;nbsp;&amp;nbsp; I set the ACS to "log 6 interval 300".&amp;nbsp; Then "logging buffered 6".&amp;nbsp;&amp;nbsp; Then I was able to see the permitted flows using "sh log | inc permitted".&amp;nbsp; All the TCP traffic build/teardown messages are in the log too.&amp;nbsp; Is there anyway to filter those out so only the "permitted/denied" msgs for the chosen ACE are displayed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chuck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 02 Oct 2011 01:41:56 GMT</pubDate>
    <dc:creator>c.fuller</dc:creator>
    <dc:date>2011-10-02T01:41:56Z</dc:date>
    <item>
      <title>Logging an ACL ACE</title>
      <link>https://community.cisco.com/t5/network-security/logging-an-acl-ace/m-p/1784291#M496634</link>
      <description>&lt;P&gt;Hello -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to determine what traffic is going through the firewall using an "access-list outside-in extended ip permit any any" ACE.&amp;nbsp;&amp;nbsp; I want to view these logs using the "show log" command on the ASA itself.&amp;nbsp; I do not have a syslog server setup to view at this point.&amp;nbsp;&amp;nbsp; I am a little confused what the exact commands should be to get this working.&amp;nbsp;&amp;nbsp; Just throwing the "log" command at the end doesn't display the logs.&amp;nbsp;&amp;nbsp; If someone can show the exact syntax on how I need to configure the ACE and what syslog commands I need to have it show up on the "sh log" buffer I would appreciate it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Chuck&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 21:33:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-an-acl-ace/m-p/1784291#M496634</guid>
      <dc:creator>c.fuller</dc:creator>
      <dc:date>2019-03-11T21:33:01Z</dc:date>
    </item>
    <item>
      <title>Logging an ACL ACE</title>
      <link>https://community.cisco.com/t5/network-security/logging-an-acl-ace/m-p/1784292#M496635</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Figured this out folks.&amp;nbsp;&amp;nbsp; I set the ACS to "log 6 interval 300".&amp;nbsp; Then "logging buffered 6".&amp;nbsp;&amp;nbsp; Then I was able to see the permitted flows using "sh log | inc permitted".&amp;nbsp; All the TCP traffic build/teardown messages are in the log too.&amp;nbsp; Is there anyway to filter those out so only the "permitted/denied" msgs for the chosen ACE are displayed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Chuck&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Oct 2011 01:41:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-an-acl-ace/m-p/1784292#M496635</guid>
      <dc:creator>c.fuller</dc:creator>
      <dc:date>2011-10-02T01:41:56Z</dc:date>
    </item>
    <item>
      <title>Logging an ACL ACE</title>
      <link>https://community.cisco.com/t5/network-security/logging-an-acl-ace/m-p/1784293#M496637</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would say use "log 6 interval 1" and then go to ASDM, right click on the permit access-rule, select "show logg" and you can see all the traffic hitting the acl in the asdm real time log viewer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Varun&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Oct 2011 04:23:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-an-acl-ace/m-p/1784293#M496637</guid>
      <dc:creator>varrao</dc:creator>
      <dc:date>2011-10-02T04:23:10Z</dc:date>
    </item>
    <item>
      <title>Logging an ACL ACE</title>
      <link>https://community.cisco.com/t5/network-security/logging-an-acl-ace/m-p/1784294#M496638</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Chuck&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not sure if this is what you are looking for, but the ASA gives you the ability to configure logging to not generate individual log messages by message ID. If you get the ID for the build and teardown messages then you can configure the ASA to not generate these syslog messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 02 Oct 2011 22:59:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-an-acl-ace/m-p/1784294#M496638</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2011-10-02T22:59:38Z</dc:date>
    </item>
  </channel>
</rss>

