<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: What do you monitor on your PIX? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/what-do-you-monitor-on-your-pix/m-p/552201#M525604</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This link is a little more current for the messages. What OS version are you running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_7_1/syslog/logmsgs.htm" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_7_1/syslog/logmsgs.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this link for some monitoring info-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/config/sysmgmt.htm" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/config/sysmgmt.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also ,check out the Cisco Security MARS appliances that analyzes and correlates security events, syslog, etc. and can help determine the actual attack path and provide mitigation options...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are interested in the attack signatures and what they are, use the PDM and go to System properties-Intrusion Detection-IDS Signature and you can see the list of signatures there...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 13 Apr 2006 17:50:06 GMT</pubDate>
    <dc:creator>davidecooper1967</dc:creator>
    <dc:date>2006-04-13T17:50:06Z</dc:date>
    <item>
      <title>What do you monitor on your PIX?</title>
      <link>https://community.cisco.com/t5/network-security/what-do-you-monitor-on-your-pix/m-p/552199#M525594</link>
      <description>&lt;P&gt;My boss has told me to monitor the PIX firewall for our company and write a monthly report.  So I&amp;#146;m sitting for hours in front of the PIX staring at the green power light. Our firewall seems to be OK.  The green light is constant on.   ;-))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I&amp;#146;ve read the Cisco Cookbook, a valuable source of how to guides. This explains how to monitor using SNMP and how to collect the syslog.  Also the PIX Firewall Handbook tells me to frequently have a look at the syslog for important messages. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So far I have a limited idea what to look for.  I intend to have a mrtg (&lt;A href="http://www.mrtg.org" target="_blank"&gt;www.mrtg.org&lt;/A&gt;) like graph for each interface.  I&amp;#146;m also considering looking for syslog messages that say user failed to authenticate for VPN connection.  But is that really everything?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What do you monitor on your PIX (or Cisco router) and what do you report?&lt;/P&gt;&lt;P&gt;If you know the SNMP ODI or PIX syslog number than plase add this information, it realy helps me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance, &lt;/P&gt;&lt;P&gt;Volker&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 08:50:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-do-you-monitor-on-your-pix/m-p/552199#M525594</guid>
      <dc:creator>vschmidt_2</dc:creator>
      <dc:date>2020-02-21T08:50:14Z</dc:date>
    </item>
    <item>
      <title>Re: What do you monitor on your PIX?</title>
      <link>https://community.cisco.com/t5/network-security/what-do-you-monitor-on-your-pix/m-p/552200#M525597</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Some basic commands I would use to monitor a pix are:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show cpu usage&lt;/P&gt;&lt;P&gt;show traffic&lt;/P&gt;&lt;P&gt;show perfmon&lt;/P&gt;&lt;P&gt;show memory&lt;/P&gt;&lt;P&gt;show xlate&lt;/P&gt;&lt;P&gt;show conn count&lt;/P&gt;&lt;P&gt;show interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You best bet would be to get a SNMP applicion to monitor some of these stats for you andthat can build reports.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would also have the pix send events to a syslog server and monitor that log for events triggered by any of the pix's 55 attack signatures. I am not sure what the exact syslog message number is for each attack signature but here is a link to all the pix syslog message numbers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v53/syslog/pixemsgs.htm" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_v53/syslog/pixemsgs.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good luck, please rate if this was helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Apr 2006 19:27:38 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-do-you-monitor-on-your-pix/m-p/552200#M525597</guid>
      <dc:creator>Nicholas Vigil</dc:creator>
      <dc:date>2006-04-12T19:27:38Z</dc:date>
    </item>
    <item>
      <title>Re: What do you monitor on your PIX?</title>
      <link>https://community.cisco.com/t5/network-security/what-do-you-monitor-on-your-pix/m-p/552201#M525604</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This link is a little more current for the messages. What OS version are you running?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_7_1/syslog/logmsgs.htm" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_7_1/syslog/logmsgs.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Check this link for some monitoring info-&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/config/sysmgmt.htm" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/config/sysmgmt.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also ,check out the Cisco Security MARS appliances that analyzes and correlates security events, syslog, etc. and can help determine the actual attack path and provide mitigation options...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are interested in the attack signatures and what they are, use the PDM and go to System properties-Intrusion Detection-IDS Signature and you can see the list of signatures there...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;DC&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 13 Apr 2006 17:50:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/what-do-you-monitor-on-your-pix/m-p/552201#M525604</guid>
      <dc:creator>davidecooper1967</dc:creator>
      <dc:date>2006-04-13T17:50:06Z</dc:date>
    </item>
  </channel>
</rss>

