<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pix Firewall Logging Problem in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/pix-firewall-logging-problem/m-p/350089#M554249</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi tonny,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There will be problems if you are going to do a syslog , and there is no syslog server on the inside. make sure you enable the syslog on the configured server on the particular port. The NAT translations might not happen if this is wrongly configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using TCP as the logging transport protocol, the PIX Firewall stops passing traffic as a security measure if any of the following error conditions occur: the PIX Firewall is unable to reach the syslog server; the syslog server is misconfigured (such as with PFSS, for example); or the disk is full. (UDP-based logging does not prevent the PIX Firewall from passing traffic if the syslog server fails.) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable the PIX Firewall to pass traffic again, do the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 1 Identify and correct the syslog server connectivity, misconfiguration, or disk space error condition. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 2 Enter the command logging host inside 10.1.1.1 tcp/1468 to enable the logging again. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternately, you can change the logging to default logging on UDP/514 by issuing the command logging host inside 10.1.1.1. UDP-based logging passes traffic even if the syslog server fails. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its always better to enable the syslog on the switches by doing a SPAN. The command to do that is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switch(config)#monitor session 1 source interface *** (interface where the PIX inside is connected)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switch(config)#monitor session 1 destination interface *** (interface where the syslog server is connected)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Hope this helps.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 04 Dec 2004 06:55:43 GMT</pubDate>
    <dc:creator>sachinraja</dc:creator>
    <dc:date>2004-12-04T06:55:43Z</dc:date>
    <item>
      <title>Pix Firewall Logging Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-logging-problem/m-p/350088#M554247</link>
      <description>&lt;P&gt;Hi there...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have problem here with logging message, i want to configure my server to receive syslog from the pix, and add this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging host inside 192.168.1.2 tcp/1468&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when i entered this command, i can't browse the internet,what is the problem actually?..here is my config, any help would be appreciated, Thanks&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tonny&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list 100 permit ip host 192.168.1.9 192.168.100.0 255.255.255.0&lt;/P&gt;&lt;P&gt;access-list outside_access_in deny icmp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in deny tcp any any&lt;/P&gt;&lt;P&gt;access-list outside_access_in deny udp any any&lt;/P&gt;&lt;P&gt;pager lines 24&lt;/P&gt;&lt;P&gt;logging on&lt;/P&gt;&lt;P&gt;logging monitor debugging&lt;/P&gt;&lt;P&gt;logging buffered debugging&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;icmp deny any outside&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;ip address outside x.x.x.x 255.0.0.0&lt;/P&gt;&lt;P&gt;ip address inside 192.168.1.1 255.255.255.0&lt;/P&gt;&lt;P&gt;ip audit name ATTACKPOLICY attack action alarm drop&lt;/P&gt;&lt;P&gt;ip audit name INTRUDERINFO info action alarm drop&lt;/P&gt;&lt;P&gt;ip audit interface outside INTRUDERINFO&lt;/P&gt;&lt;P&gt;ip audit interface outside ATTACKPOLICY&lt;/P&gt;&lt;P&gt;ip audit info action alarm&lt;/P&gt;&lt;P&gt;ip audit attack action alarm&lt;/P&gt;&lt;P&gt;ip local pool vpnpool 192.168.100.1-192.168.100.254&lt;/P&gt;&lt;P&gt;pdm location 192.168.1.9 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm location 192.168.1.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;pdm history enable&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 10 interface&lt;/P&gt;&lt;P&gt;nat (inside) 0 access-list 100&lt;/P&gt;&lt;P&gt;nat (inside) 10 0.0.0.0 0.0.0.0 0 0&lt;/P&gt;&lt;P&gt;access-group outside_access_in in interface outside&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 10.1.1.1 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 rpc 0:10:00 h225 1:00:00&lt;/P&gt;&lt;P&gt;timeout h323 0:05:00 mgcp 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;timeout uauth 0:05:00 absolute&lt;/P&gt;&lt;P&gt;aaa-server TACACS+ protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server RADIUS protocol radius&lt;/P&gt;&lt;P&gt;aaa-server LOCAL protocol local&lt;/P&gt;&lt;P&gt;aaa-server AuthPIX protocol tacacs+&lt;/P&gt;&lt;P&gt;aaa-server AuthPIX (inside) host 192.168.1.2 TacacsKey timeout 10&lt;/P&gt;&lt;P&gt;aaa-server AuthOut protocol tacacs+&lt;/P&gt;&lt;P&gt;url-server (inside) vendor websense host 192.168.1.2 timeout 5 protocol TCP vers&lt;/P&gt;&lt;P&gt;ion 1&lt;/P&gt;&lt;P&gt;aaa authentication ssh console AuthPIX&lt;/P&gt;&lt;P&gt;http server enable&lt;/P&gt;&lt;P&gt;http 192.168.1.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;no snmp-server location&lt;/P&gt;&lt;P&gt;no snmp-server contact&lt;/P&gt;&lt;P&gt;snmp-server community public&lt;/P&gt;&lt;P&gt;no snmp-server enable traps&lt;/P&gt;&lt;P&gt;tftp-server inside 192.168.1.2 c:\cisco&lt;/P&gt;&lt;P&gt;floodguard enable&lt;/P&gt;&lt;P&gt;sysopt connection permit-ipsec&lt;/P&gt;&lt;P&gt;auth-prompt reject You're not authorized&lt;/P&gt;&lt;P&gt;crypto ipsec transform-set myset esp-3des esp-md5-hmac&lt;/P&gt;&lt;P&gt;crypto dynamic-map dynmap 10 set transform-set myset&lt;/P&gt;&lt;P&gt;crypto map mymap 10 ipsec-isakmp dynamic dynmap&lt;/P&gt;&lt;P&gt;crypto map mymap client configuration address initiate&lt;/P&gt;&lt;P&gt;crypto map mymap client configuration address respond&lt;/P&gt;&lt;P&gt;crypto map mymap client authentication LOCAL&lt;/P&gt;&lt;P&gt;crypto map mymap interface outside&lt;/P&gt;&lt;P&gt;isakmp enable outside&lt;/P&gt;&lt;P&gt;isakmp identity address&lt;/P&gt;&lt;P&gt;isakmp policy 10 authentication pre-share&lt;/P&gt;&lt;P&gt;isakmp policy 10 encryption 3des&lt;/P&gt;&lt;P&gt;isakmp policy 10 hash md5&lt;/P&gt;&lt;P&gt;isakmp policy 10 group 2&lt;/P&gt;&lt;P&gt;isakmp policy 10 lifetime 86400&lt;/P&gt;&lt;P&gt;vpngroup **** address-pool vpnpool&lt;/P&gt;&lt;P&gt;vpngroup **** split-tunnel 100&lt;/P&gt;&lt;P&gt;vpngroup **** idle-time 4800&lt;/P&gt;&lt;P&gt;vpngroup **** password ********&lt;/P&gt;&lt;P&gt;telnet 192.168.1.2 255.255.255.255 inside&lt;/P&gt;&lt;P&gt;telnet timeout 60&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;username xxx password xxxxxx&lt;/P&gt;&lt;P&gt;privilege 2&lt;/P&gt;&lt;P&gt;username xxx password xxxxxx&lt;/P&gt;&lt;P&gt;privilege 15&lt;/P&gt;&lt;P&gt;privilege show level 10 command access-list&lt;/P&gt;&lt;P&gt;privilege configure level 11 command access-list&lt;/P&gt;&lt;P&gt;privilege clear level 12 command access-list&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:47:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-logging-problem/m-p/350088#M554247</guid>
      <dc:creator>tonny_ecmyy</dc:creator>
      <dc:date>2020-02-21T07:47:13Z</dc:date>
    </item>
    <item>
      <title>Re: Pix Firewall Logging Problem</title>
      <link>https://community.cisco.com/t5/network-security/pix-firewall-logging-problem/m-p/350089#M554249</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi tonny,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There will be problems if you are going to do a syslog , and there is no syslog server on the inside. make sure you enable the syslog on the configured server on the particular port. The NAT translations might not happen if this is wrongly configured.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are using TCP as the logging transport protocol, the PIX Firewall stops passing traffic as a security measure if any of the following error conditions occur: the PIX Firewall is unable to reach the syslog server; the syslog server is misconfigured (such as with PFSS, for example); or the disk is full. (UDP-based logging does not prevent the PIX Firewall from passing traffic if the syslog server fails.) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable the PIX Firewall to pass traffic again, do the following: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 1 Identify and correct the syslog server connectivity, misconfiguration, or disk space error condition. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Step 2 Enter the command logging host inside 10.1.1.1 tcp/1468 to enable the logging again. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Alternately, you can change the logging to default logging on UDP/514 by issuing the command logging host inside 10.1.1.1. UDP-based logging passes traffic even if the syslog server fails. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Its always better to enable the syslog on the switches by doing a SPAN. The command to do that is as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switch(config)#monitor session 1 source interface *** (interface where the PIX inside is connected)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;switch(config)#monitor session 1 destination interface *** (interface where the syslog server is connected)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Hope this helps.. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Raj&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 04 Dec 2004 06:55:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/pix-firewall-logging-problem/m-p/350089#M554249</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2004-12-04T06:55:43Z</dc:date>
    </item>
  </channel>
</rss>

