<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Audit trail in a Cisco ASA in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/3932999#M5386</link>
    <description>i am using Algosec Firewall Analyzer and all the informational syslogs are being forwarded to it ..i can see the commands being run on the ASA but the user id is not available with those commands... Hide username logging is also disabled.&lt;BR /&gt;</description>
    <pubDate>Tue, 01 Oct 2019 10:05:43 GMT</pubDate>
    <dc:creator>NeWGuy1109</dc:creator>
    <dc:date>2019-10-01T10:05:43Z</dc:date>
    <item>
      <title>Audit trail in a Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/3932485#M5382</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;As i understand syslog id 111008-111010 can be used as an audit trail to record the changes in Firewalls...&lt;/P&gt;&lt;P&gt;However, does an audit trail corresponds to policy change only ?&lt;/P&gt;&lt;P&gt;Suppose a user runs "permit traffic same security intra-interface" can this command be logged as an audit trail to an external syslog server ?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 17:32:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/3932485#M5382</guid>
      <dc:creator>NeWGuy1109</dc:creator>
      <dc:date>2020-02-21T17:32:26Z</dc:date>
    </item>
    <item>
      <title>Re: Audit trail in a Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/3932585#M5383</link>
      <description>&lt;P&gt;you can setup one for the Audit logs to send to syslog as below, all the commands enter by the user will be logged.&lt;/P&gt;
&lt;P&gt;or if you have AAA (like ACS, ISE can also audit the same).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can also set the ASA to log all login and command execution actions and send those logs to an external syslog server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;logging enable&lt;BR /&gt;logging list cmds message 111009&lt;/P&gt;
&lt;P&gt;logging trap cmds&lt;/P&gt;
&lt;P&gt;logging host inside x.x.x.x&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You can replace 'inside' with the name of interface where syslog server x.x.x.x resides.&lt;/P&gt;</description>
      <pubDate>Mon, 30 Sep 2019 15:22:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/3932585#M5383</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-09-30T15:22:34Z</dc:date>
    </item>
    <item>
      <title>Re: Audit trail in a Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/3932999#M5386</link>
      <description>i am using Algosec Firewall Analyzer and all the informational syslogs are being forwarded to it ..i can see the commands being run on the ASA but the user id is not available with those commands... Hide username logging is also disabled.&lt;BR /&gt;</description>
      <pubDate>Tue, 01 Oct 2019 10:05:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/3932999#M5386</guid>
      <dc:creator>NeWGuy1109</dc:creator>
      <dc:date>2019-10-01T10:05:43Z</dc:date>
    </item>
    <item>
      <title>Re: Audit trail in a Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/3933231#M5388</link>
      <description>&lt;P&gt;can you provide a sample log and you're implemented configure to verify?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Oct 2019 15:50:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/3933231#M5388</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-10-01T15:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: Audit trail in a Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/3933574#M5390</link>
      <description>&lt;P&gt;In ASA , algosec is added as a syslog server and all informational logs are being forwarded to it. I do see policy change notifications in algosec such as NAT change, rule change etc.. but when someone is running commands such as "permit traffic same security inter interface" i cant see the name of the id who executed it... One thing i would like to know is whether there is a particular category of commands which are generated as "Audit Logs" in ASA, is it possible to modify ASA config in such a way that an admin can modify what commands are&amp;nbsp; captured as Audit logs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2019 08:26:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/3933574#M5390</guid>
      <dc:creator>NeWGuy1109</dc:creator>
      <dc:date>2019-10-02T08:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: Audit trail in a Cisco ASA</title>
      <link>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/4568356#M1088141</link>
      <description>&lt;P&gt;It looks like if you want to use syslog, there are three messages&lt;/P&gt;&lt;P&gt;111008 - logs the command&amp;nbsp;&amp;nbsp; (Level 5 - Notification) - excludes "show" commands&lt;/P&gt;&lt;P&gt;111010 - logs the command and user info (Level 5 - Notification) - excludes "show" commands&lt;/P&gt;&lt;P&gt;111009 - logs everything, even "show" (Level 7 - Debugging)&lt;/P&gt;&lt;P&gt;There's also a way to change what level a given message logs at, if I understand somebody else's comment correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But the right way to do this is to use the AAA accounting commands (which I'm still looking into how to do; do those only log to your TACACS/RADIUS/etc server or can you also get them over to syslog.)&lt;/P&gt;</description>
      <pubDate>Thu, 10 Mar 2022 20:43:24 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/audit-trail-in-a-cisco-asa/m-p/4568356#M1088141</guid>
      <dc:creator>bstewart</dc:creator>
      <dc:date>2022-03-10T20:43:24Z</dc:date>
    </item>
  </channel>
</rss>

