<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Getting PIX logs in a secure way in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/getting-pix-logs-in-a-secure-way/m-p/120840#M638679</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I´m not sure, because I haven´t tested it, but if you have an extra NIC in your PIX  you can build a small secure LAN only for syslogging(not routed anywhere). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address Extra_NIC 10.0.0.1 255.255.255.252&lt;/P&gt;&lt;P&gt;logging host Extra_NIC 10.0.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you should be able to set up a syslogserver  (10.0.0.2) and connect it with a UTP-cable or mediaconverters + fibre if you want to physically separate the syslogserver from the PIX. The syslogserver could have 2 NICs (the other on a "non-secure" routed LAN) and SSH installed for secure access to the logfiles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BUT as mentioned earlier: I haven´t tested this !!&lt;/P&gt;&lt;P&gt;Comments any ? &lt;/P&gt;&lt;P&gt;It would be nice to have this solution confirmed or thrown in the bin, but I don´t have access to a Lab-PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/ Per&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 02 Apr 2003 11:59:35 GMT</pubDate>
    <dc:creator>per.bergman</dc:creator>
    <dc:date>2003-04-02T11:59:35Z</dc:date>
    <item>
      <title>Getting PIX logs in a secure way</title>
      <link>https://community.cisco.com/t5/network-security/getting-pix-logs-in-a-secure-way/m-p/120838#M638576</link>
      <description>&lt;P&gt;Hello, &lt;/P&gt;&lt;P&gt;does anyone know any method to retrive directly from a PIX his logs in a crypted (i.e. secure) way without a VPN? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you &lt;/P&gt;&lt;P&gt;Paolo &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:39:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/getting-pix-logs-in-a-secure-way/m-p/120838#M638576</guid>
      <dc:creator>pcavicch</dc:creator>
      <dc:date>2020-02-21T06:39:49Z</dc:date>
    </item>
    <item>
      <title>Re: Getting PIX logs in a secure way</title>
      <link>https://community.cisco.com/t5/network-security/getting-pix-logs-in-a-secure-way/m-p/120839#M638607</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The Pix can only use syslog to send system messages.  Therefore, there is no secure to receive them over the network except over a VPN tunnel.  You could use a console cable to log them to a directly connected host and then use SCP to move them to the desired location.  Or forward syslog over SSH from that host.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Why are you avoiding the VPN scenario?  What is the problem you need to solve?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 01 Apr 2003 16:25:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/getting-pix-logs-in-a-secure-way/m-p/120839#M638607</guid>
      <dc:creator>shannong</dc:creator>
      <dc:date>2003-04-01T16:25:46Z</dc:date>
    </item>
    <item>
      <title>Re: Getting PIX logs in a secure way</title>
      <link>https://community.cisco.com/t5/network-security/getting-pix-logs-in-a-secure-way/m-p/120840#M638679</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I´m not sure, because I haven´t tested it, but if you have an extra NIC in your PIX  you can build a small secure LAN only for syslogging(not routed anywhere). &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip address Extra_NIC 10.0.0.1 255.255.255.252&lt;/P&gt;&lt;P&gt;logging host Extra_NIC 10.0.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you should be able to set up a syslogserver  (10.0.0.2) and connect it with a UTP-cable or mediaconverters + fibre if you want to physically separate the syslogserver from the PIX. The syslogserver could have 2 NICs (the other on a "non-secure" routed LAN) and SSH installed for secure access to the logfiles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;BUT as mentioned earlier: I haven´t tested this !!&lt;/P&gt;&lt;P&gt;Comments any ? &lt;/P&gt;&lt;P&gt;It would be nice to have this solution confirmed or thrown in the bin, but I don´t have access to a Lab-PIX&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;/ Per&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 02 Apr 2003 11:59:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/getting-pix-logs-in-a-secure-way/m-p/120840#M638679</guid>
      <dc:creator>per.bergman</dc:creator>
      <dc:date>2003-04-02T11:59:35Z</dc:date>
    </item>
  </channel>
</rss>

