<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ASA5510 not syslogging acl rules in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432492#M758552</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Who owns these addresses and where do these hosts live with respect to the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Deny IP spoof from (Host-192.168.1.44) to 192.168.2.250 on interface Internal&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would get these deny ip spoof messages&lt;/P&gt;&lt;P&gt;1. if a host that lives behind the inside interface tries to send packet destined to the ASA's other interface address besides the inside interface address.&lt;/P&gt;&lt;P&gt;2. if the syslog that the ASA sends to the syslog server reaches a layer 3 device and it in turn does not have a route to the syslog server and sends the packet back to the ASA - meaning the ASA sees a packets sent to it from its own address. Makes sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are the two that I have seen. There could be others as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 08 Aug 2010 11:25:51 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-08-08T11:25:51Z</dc:date>
    <item>
      <title>ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432482#M758307</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; I have my asa logging to a linux box but it won't log acl events.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've done countless acl's in cisco routers, for example with an entry like below I see all the incoming web traffic.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;access-list 100 permit tcp any gt 1023 host x.x.x.x eq 80 log&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As stated the asa is syslogging basic stuff so I have that correct, the problem is it won't log this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;access-list Internal_access_out extended permit ip any any log&lt;BR /&gt;access-list Internal_access_in extended permit ip any any log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;access-group Internal_access_in in interface Internal&lt;BR /&gt;access-group Internal_access_out out interface Internal&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, Jeff&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 18:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432482#M758307</guid>
      <dc:creator>Unyalliman</dc:creator>
      <dc:date>2019-03-11T18:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432483#M758323</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeff,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What does your logging configuration look like ('show run log')?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;By default the 'log' keyword logs the ACL hits at level 6, so if your logging config does not log down at this level you won't see any messages. You can adjust the level in either the logging configuration, or change the level for the ACE ('access-list test permit ip any any log 2').&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 14:12:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432483#M758323</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-08-06T14:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432484#M758350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mike,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Here's my show run log but if I simply add a 2 after my log statement it will log?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;logging enable&lt;BR /&gt;logging timestamp&lt;BR /&gt;logging trap informational&lt;BR /&gt;logging asdm informational&lt;BR /&gt;logging from-address ***************************&lt;BR /&gt;logging recipient-address ********************* level errors&lt;BR /&gt;logging facility 18&lt;BR /&gt;logging host Internal ************************&lt;BR /&gt;logging debug-trace&lt;BR /&gt;logging permit-hostdown&lt;BR /&gt;no logging message 106015&lt;BR /&gt;no logging message 313001&lt;BR /&gt;no logging message 725001&lt;BR /&gt;no logging message 725002&lt;BR /&gt;no logging message 313008&lt;BR /&gt;no logging message 725007&lt;BR /&gt;no logging message 106023&lt;BR /&gt;no logging message 710003&lt;BR /&gt;no logging message 111008&lt;BR /&gt;no logging message 302015&lt;BR /&gt;no logging message 302014&lt;BR /&gt;no logging message 302013&lt;BR /&gt;no logging message 111001&lt;BR /&gt;no logging message 111004&lt;BR /&gt;no logging message 111007&lt;BR /&gt;no logging message 302018&lt;BR /&gt;no logging message 302017&lt;BR /&gt;no logging message 302016&lt;BR /&gt;no logging message 302021&lt;BR /&gt;no logging message 302020&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks, Jeff&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 14:20:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432484#M758350</guid>
      <dc:creator>Unyalliman</dc:creator>
      <dc:date>2010-08-06T14:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432485#M758382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeff,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Based on the config you posted, you should see syslog message #106100 on your syslog server and in ASDM (though not via email). Can you confirm whether the ASA is generating this log message? This is probably the easiest way to do it:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;logging buffered 6&lt;/P&gt;&lt;P&gt;&lt;GENERATE some="" traffic="" that="" will="" hit="" your="" logged="" ace=""&gt;&lt;/GENERATE&gt;&lt;/P&gt;&lt;P&gt;show log | i 106100&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you see the messages there, you'll know that messages aren't making it to your syslog server. If you don't see any output, we would have to figure out why the ASA is neglecting to generate the messages as it should.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 15:01:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432485#M758382</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-08-06T15:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432486#M758412</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Quote: "we would have to figure out why the ASA is neglecting to generate the messages as it should."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Looks like this is the case mike.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;chy5510# show log | i 106100&lt;BR /&gt;chy5510# show log&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;chy5510# show log&lt;BR /&gt;Syslog logging: enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Facility: 18&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Timestamp logging: enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Standby logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Debug-trace logging: enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Console logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Monitor logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Buffer logging: level informational, 36 messages logged&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Trap logging: level informational, facility 18, 279 messages logged&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Logging to Internal *****************&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Permit-hostdown logging: enabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; History logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Device ID: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Mail logging: disabled&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ASDM logging: level informational, 279 messages logged&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 15:20:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432486#M758412</guid>
      <dc:creator>Unyalliman</dc:creator>
      <dc:date>2010-08-06T15:20:43Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432487#M758440</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Jeff,&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;What does 'show acces&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;s-l&lt;SPAN style="color: #000000;"&gt;ist Internal_access_out' and 'show access-list Internal_access_in'&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN style="color: #000000; "&gt; say? Do you see the hit counts on the ACL increasing when you generate your test traffic?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 15:40:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432487#M758440</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-08-06T15:40:20Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432488#M758465</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;chy5510# show access-list Internal_access_out&lt;BR /&gt;access-list Internal_access_out; 1 elements; name hash: 0x9e8020ff&lt;BR /&gt;access-list Internal_access_out line 1 extended permit ip any any log informational interval 300 (hitcnt=0) 0x7fdd7e55&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;chy5510# show access-list Internal_access_in&lt;BR /&gt;access-list Internal_access_in; 1 elements; name hash: 0x920ddc01&lt;BR /&gt;access-list Internal_access_in line 1 extended permit ip any any log informational interval 300 (hitcnt=0) 0x4863aa83&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 15:50:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432488#M758465</guid>
      <dc:creator>Unyalliman</dc:creator>
      <dc:date>2010-08-06T15:50:32Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432489#M758491</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Looks like those ACLs are not matching the traffic you are testing with. Did you confirm with 'show run access-group' that the ACLs are still applied to the interface? If so then try using the packet-tracer to see what's going on:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA# packet-tracer input internal udp &lt;INSIDE_IP&gt; 1234 4.2.2.2 53&lt;/INSIDE_IP&gt;&lt;/P&gt;&lt;P&gt;(or replace with whatever protocols/IPs/ports you are using to test)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My guess is that the traffic will be taking some interface other than 'internal'.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 15:56:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432489#M758491</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-08-06T15:56:02Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432490#M758513</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It's not hitting my ACL. It's getting caught by some hiddin ACL.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This got logged in the syslog.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Deny IP spoof from (Host-192.168.1.44) to 192.168.2.250 on interface Internal&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And here is the output of your command.&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;chy5510# packet-tracer input internal udp 192.168.1.44 1071 192.168.2.250 53&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Phase: 1&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;MAC Access list&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Phase: 2&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: input&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;in&amp;nbsp;&amp;nbsp; Network-192.168.2.0 255.255.255.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Internal&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Phase: 3&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: DROP&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Result:&lt;BR /&gt;input-interface: Internal&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: Internal&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: drop&lt;BR /&gt;Drop-reason: (acl-drop) Flow is denied by configured rule&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 06 Aug 2010 16:14:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432490#M758513</guid>
      <dc:creator>Unyalliman</dc:creator>
      <dc:date>2010-08-06T16:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432491#M758533</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; I am going to go out on a limb and say that 192.168.1.44 and 192.168.2.250 are both off the inside interface according to the routing table. If thats the case, then the packet tracer line you tested would be like 'hairpinning' the traffic on the internal interface, no? If your intent is to hairpin traffic, then that is a whole other configuration we need to be talking about. If the goal of the acl lines is just to log when someone goes through the firewall try a packet tracer line like:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;packet-tracer input internal udp 192.168.1.44 12345 4.2.2.2 53&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The reason why that packet tracer test you did failed was becuase you lack the command 'same-security permit intra-interface' in your config. You do not need that command unless your expect to hairpin traffic on the firewall. (don't add it unless you intend to).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Magnus&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Aug 2010 03:55:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432491#M758533</guid>
      <dc:creator>Magnus Mortensen</dc:creator>
      <dc:date>2010-08-08T03:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432492#M758552</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Who owns these addresses and where do these hosts live with respect to the firewall?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Deny IP spoof from (Host-192.168.1.44) to 192.168.2.250 on interface Internal&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would get these deny ip spoof messages&lt;/P&gt;&lt;P&gt;1. if a host that lives behind the inside interface tries to send packet destined to the ASA's other interface address besides the inside interface address.&lt;/P&gt;&lt;P&gt;2. if the syslog that the ASA sends to the syslog server reaches a layer 3 device and it in turn does not have a route to the syslog server and sends the packet back to the ASA - meaning the ASA sees a packets sent to it from its own address. Makes sense?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;These are the two that I have seen. There could be others as well.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 08 Aug 2010 11:25:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432492#M758552</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-08-08T11:25:51Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432493#M758565</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff; font-family: arial,helvetica,sans-serif; "&gt;&lt;SPAN style="color: #ff0000;"&gt;QUOTE:&lt;/SPAN&gt; "I am going to go out on a limb and say that 192.168.1.44 and 192.168.2.250 are both off the inside interface according to the routing table. If thats the case, then the packet tracer line you tested would be like 'hairpinning' the traffic on the internal interface, no?"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;JEFF: You are correct in that these are both internal addresses. 192.168.1.44 in the physical address of the internal interface and 192.168.2.250 is an internal DNS server that I can ping from the asa. Now for the hairpinning topic; I've never heard this term before, is it also called something else?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #0000ff;"&gt;&lt;SPAN style="color: #ff0000;"&gt;QUOTE:&lt;/SPAN&gt; "If the goal of the acl lines is just to log when someone goes through the firewall try a packet tracer line like:&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #0000ff;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #0000ff;"&gt;packet-tracer input internal udp 192.168.1.44 12345 4.2.2.2 53"&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;JEFF: At the moment I'm trying to prove I can see each and every packet to/from/traversing this device. When running your command I get "Failed to locate egress interface for UDP from Internal:192.168.1.44/12345 to 4.2.2.2/53". Makes sense to me as I don't have and internal 4.2.2.0 network. Now if I run this command destined for an actual machine I get the above.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif; color: #0000ff;"&gt;&lt;SPAN style="color: #ff0000;"&gt;QUOTE:&lt;/SPAN&gt; "The reason why that packet tracer test you did failed was becuase you lack the command 'same-security permit intra-interface' in your config. You do not need that command unless your expect to hairpin traffic on the firewall. (don't add it unless you intend to)."&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;JEFF: This command is the same a checking the check box to "Enable traffic between two or more interfaces with the same security level"? If so I have this un-checked. Why would I need this checked if I'm not doing anything intra-interface?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-family: arial,helvetica,sans-serif;"&gt;Thinking on this hairpin thing I believe you mean u-turn but not sure. &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 09 Aug 2010 13:38:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432493#M758565</guid>
      <dc:creator>Unyalliman</dc:creator>
      <dc:date>2010-08-09T13:38:47Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432494#M758578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Have I found a black hole? Should I open a TAC?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 13:43:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432494#M758578</guid>
      <dc:creator>Unyalliman</dc:creator>
      <dc:date>2010-08-10T13:43:48Z</dc:date>
    </item>
    <item>
      <title>Re: ASA5510 not syslogging acl rules</title>
      <link>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432495#M758588</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi &lt;SPAN style="color: #000000;"&gt;Jeff,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;To clear up some of the confusion, hairpinning and u-turning are indeed the same thing. However, the 'same-security permit intra-interface' command is not the same as the "Enable traffic between two or more interfaces with the same security level" checkbox that you mentioned (that would be the 'same-security permit &lt;SPAN style="color: #ff0000;"&gt;inter&lt;/SPAN&gt;-interface' command). The 'intra' version allows you to u-turn traffic, while the 'inter' version allows traffic to pass in a sitation where both the ingress and egress interfaces have the same security level value.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;&lt;SPAN style="color: #000000;"&gt;As Magnus mentioned, if traffic reaching your firewall needs to be u-turned (for example, it arrives on the "inside" interface and is supposed to leave on the "inside" interface), you'll need the 'same-security permit intra-interface' command for it to work.&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Once you are able to get the packet-tracer to allow the packet, the hitcounts on the ACL should start increasing and you should see log messages generated for each hit.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Aug 2010 14:25:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/asa5510-not-syslogging-acl-rules/m-p/1432495#M758588</guid>
      <dc:creator>mirober2</dc:creator>
      <dc:date>2010-08-10T14:25:28Z</dc:date>
    </item>
  </channel>
</rss>

