<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Taking out  Any Any hitting loggs in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808161#M6827</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My rule number is 56 for Any Any ACL, how can i create a event for getting logs related to this rule only. please send me how it configure.&lt;/P&gt;
&lt;P&gt;I need to capture source and destination with ports which hitting to rule number 56 only.&lt;/P&gt;
&lt;P&gt;configured a syslog server also&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;Dilk&lt;/P&gt;</description>
    <pubDate>Sat, 23 Feb 2019 03:52:28 GMT</pubDate>
    <dc:creator>Lahiruk</dc:creator>
    <dc:date>2019-02-23T03:52:28Z</dc:date>
    <item>
      <title>Taking out  Any Any hitting loggs</title>
      <link>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3807703#M6820</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have deployed Cisco 2100 series ASA with multi context mode and it contains any any rule in some contexts. So I need to take out all the traffic loggs which hitting any any rule.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any idea of taking loggs for each any any rule. ? I need to remove this rule before it goes live.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Dil&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 16:51:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3807703#M6820</guid>
      <dc:creator>Lahiruk</dc:creator>
      <dc:date>2020-02-21T16:51:02Z</dc:date>
    </item>
    <item>
      <title>Re: Taking out  Any Any hitting loggs</title>
      <link>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3807716#M6821</link>
      <description>&lt;P&gt;Have you configured external log server to log these ? if not you will not able to get that information.&lt;/P&gt;
&lt;P&gt;if you like to have all the logs, configure syslog server and route the logs to log server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2019 15:01:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3807716#M6821</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-02-22T15:01:53Z</dc:date>
    </item>
    <item>
      <title>Re: Taking out  Any Any hitting loggs</title>
      <link>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3807725#M6823</link>
      <description>&lt;P&gt;Hi BB,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have not configured external server yet , and hope to configure.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I just need to taking out traffic loggs which hitting only any any ACLs.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Dilk&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2019 15:07:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3807725#M6823</guid>
      <dc:creator>Lahiruk</dc:creator>
      <dc:date>2019-02-22T15:07:27Z</dc:date>
    </item>
    <item>
      <title>Re: Taking out  Any Any hitting loggs</title>
      <link>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3807832#M6824</link>
      <description>&lt;P&gt;Sure you configure only those to logs to export to syslog server.&lt;/P&gt;</description>
      <pubDate>Fri, 22 Feb 2019 17:18:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3807832#M6824</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-02-22T17:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: Taking out  Any Any hitting loggs</title>
      <link>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808161#M6827</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My rule number is 56 for Any Any ACL, how can i create a event for getting logs related to this rule only. please send me how it configure.&lt;/P&gt;
&lt;P&gt;I need to capture source and destination with ports which hitting to rule number 56 only.&lt;/P&gt;
&lt;P&gt;configured a syslog server also&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;regards,&lt;/P&gt;
&lt;P&gt;Dilk&lt;/P&gt;</description>
      <pubDate>Sat, 23 Feb 2019 03:52:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808161#M6827</guid>
      <dc:creator>Lahiruk</dc:creator>
      <dc:date>2019-02-23T03:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: Taking out  Any Any hitting loggs</title>
      <link>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808216#M6830</link>
      <description>&lt;PRE class="prettyprint"&gt;logging enable&lt;BR /&gt;&lt;STRONG&gt;logging timestamp&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;logging message 106100&lt;/STRONG&gt;&lt;BR /&gt;logging trap informational or debug ( depends on your requirememt)&lt;BR /&gt;logging host MANAGEMENT 10.10.10.10&lt;BR /&gt;!&lt;BR /&gt;&lt;STRONG&gt;access-list 56 XXXXXXX  any any log&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;PRE&gt;&lt;STRONG&gt;checking logs&lt;BR /&gt;show logging message 106100&lt;/STRONG&gt;&lt;/PRE&gt;
&lt;P&gt;here is teh guide&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#anc27" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/pix-500-series-security-appliances/63884-config-asa-00.html#anc27&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;make sure you have syslog server running and you have ACL setup on ASA&amp;nbsp; for that&amp;nbsp; syslog host port 514.&lt;/P&gt;</description>
      <pubDate>Sat, 23 Feb 2019 11:13:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808216#M6830</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-02-23T11:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: Taking out  Any Any hitting loggs</title>
      <link>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808408#M6832</link>
      <description>&lt;P&gt;Disable logging on all access control entries except the permit ip any any ACL.&amp;nbsp; This can be done&amp;nbsp; in ASDM by unchecking the logging enable check box in each ACL or adding the keywords "logging disable" at the end of each access control entry in the CLI.&lt;/P&gt;</description>
      <pubDate>Sat, 23 Feb 2019 22:18:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808408#M6832</guid>
      <dc:creator>Marius Gunnerud</dc:creator>
      <dc:date>2019-02-23T22:18:55Z</dc:date>
    </item>
    <item>
      <title>Re: Taking out  Any Any hitting loggs</title>
      <link>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808741#M6834</link>
      <description>Thanks All,&lt;BR /&gt;&lt;BR /&gt;I found a way to collect it from the ASDM itself.&lt;BR /&gt;&lt;BR /&gt;1. Enable debugging in particular ACL&lt;BR /&gt;2. Go to Confiuration ⇒ Device Management ⇒ Logging ⇒ Logging filters ⇒Select the logging destination as ASDM and change the serevivity level into debugging&lt;BR /&gt;3. Go back to again ACL ⇒ Write click ⇒ and select show log&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dilk&lt;BR /&gt;</description>
      <pubDate>Mon, 25 Feb 2019 03:25:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808741#M6834</guid>
      <dc:creator>Lahiruk</dc:creator>
      <dc:date>2019-02-25T03:25:26Z</dc:date>
    </item>
    <item>
      <title>Re: Taking out  Any Any hitting loggs</title>
      <link>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808841#M6837</link>
      <description>&lt;P&gt;As for as i know that log do current until buffer over flow, that not cover history of the logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As per your orginal post you like to log them and analyse them for later use (correct me if my understanding was wrong) ?&lt;/P&gt;</description>
      <pubDate>Mon, 25 Feb 2019 08:48:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808841#M6837</guid>
      <dc:creator>balaji.bandi</dc:creator>
      <dc:date>2019-02-25T08:48:45Z</dc:date>
    </item>
    <item>
      <title>Re: Taking out  Any Any hitting loggs</title>
      <link>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808849#M6839</link>
      <description>Thanks BB for your response and for the time being I had to analyze real time traffic. Later I will configure for old traffic using a syslog server. &lt;BR /&gt;&lt;BR /&gt;Thanks for your answers &lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;Dilk&lt;BR /&gt;</description>
      <pubDate>Mon, 25 Feb 2019 08:57:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/taking-out-any-any-hitting-loggs/m-p/3808849#M6839</guid>
      <dc:creator>Lahiruk</dc:creator>
      <dc:date>2019-02-25T08:57:26Z</dc:date>
    </item>
  </channel>
</rss>

