<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ASA ACL Log in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa-acl-log/m-p/1731017#M553515</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is not really the way to go, for one hand, even unstrusted traffic or traffic that can be malicious can be flowing thru that ACL, so if you set logging, you will be able to see the packets hitting there, you will think well thats normal and then set an acl to let it in... &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best approach is harden what is exactly that you need to allow to your network and narrow down the policies like that. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in any case, if you want still going this way, put log at the end of the ACL with the permit ip any any, you will be able to see source, destinations and ports. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 Jun 2011 04:32:17 GMT</pubDate>
    <dc:creator>Maykol Rojas</dc:creator>
    <dc:date>2011-06-16T04:32:17Z</dc:date>
    <item>
      <title>ASA ACL Log</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-log/m-p/1731016#M553514</link>
      <description>&lt;P&gt;I am in the process of reviewing and cleaning up an inherited ASA.&amp;nbsp; There is an ACL on a particular interface that is receiving a lot of hits because it is set to any any with protocol ip.&amp;nbsp; I take it that is allowing all traffic .&amp;nbsp; I would like to view the actual traffic that passes on this particular ACL so I can setup more restrictive ACLs and do away with this wide open ACL.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 20:45:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-log/m-p/1731016#M553514</guid>
      <dc:creator>fasteddye</dc:creator>
      <dc:date>2019-03-11T20:45:51Z</dc:date>
    </item>
    <item>
      <title>ASA ACL Log</title>
      <link>https://community.cisco.com/t5/network-security/asa-acl-log/m-p/1731017#M553515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is not really the way to go, for one hand, even unstrusted traffic or traffic that can be malicious can be flowing thru that ACL, so if you set logging, you will be able to see the packets hitting there, you will think well thats normal and then set an acl to let it in... &lt;SPAN __jive_emoticon_name="sad" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/sad.gif"&gt;&lt;/SPAN&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best approach is harden what is exactly that you need to allow to your network and narrow down the policies like that. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But in any case, if you want still going this way, put log at the end of the ACL with the permit ip any any, you will be able to see source, destinations and ports. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 Jun 2011 04:32:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa-acl-log/m-p/1731017#M553515</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2011-06-16T04:32:17Z</dc:date>
    </item>
  </channel>
</rss>

