<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT monitoring / syslog in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388847#M857352</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm interesting question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe just like the built dynamic translation syslog you can follow this syslog&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feb 03 2010 09:04:01: %ASA-6-302013: Built inbound TCP connection 165172 for outside:10.117.14.69/51132 (10.117.14.69/51132) to inside:192.168.2.2/5900 (172.18.254.34/5900)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;305011: Built static TCP translation from inside:192.168.41.10/8501 to outside:a.b.c.d/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This one is for static.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Grep for syslog 302013 and 305011and see how of this your firewall logs in a day.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Feb 2010 14:33:13 GMT</pubDate>
    <dc:creator>Kureli Sankar</dc:creator>
    <dc:date>2010-02-03T14:33:13Z</dc:date>
    <item>
      <title>NAT monitoring / syslog</title>
      <link>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388844#M857349</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I try to analyze a complex PIX config and would like to analyze the NAT usage. There are ALL variations of NATing in it, therefore I get static, dynamic, nat exemption etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can see how I could trace down dynamic NAT (by counting "built dynamic TCP translation" in the syslog data) and ACL-based NAT (via acl counters).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any idea how to trace static NAT usage und exemption / nat 0 usage ?&amp;nbsp; As a last ressort, permit ACLs would be an idea (and then have counters on them), but I´d like a more comfortable way.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any hints on tools are welcome as well, currently I test FireGen which looks quite nice and is affordable.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Later,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oliver&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 17:03:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388844#M857349</guid>
      <dc:creator>keller.oliver</dc:creator>
      <dc:date>2019-03-11T17:03:48Z</dc:date>
    </item>
    <item>
      <title>Re: NAT monitoring / syslog</title>
      <link>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388845#M857350</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am not sure what the exact question is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you want to see what xlates are being used you can get the output of command "sh xlate detail".&lt;/P&gt;&lt;P&gt;Also, if the PIX is running later versions (not 6.3) you can run a packet tracer for a packet to see how it is going to be translated (packet-tracer command.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope it helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 01 Feb 2010 22:25:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388845#M857350</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-02-01T22:25:05Z</dc:date>
    </item>
    <item>
      <title>Re: NAT monitoring / syslog</title>
      <link>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388846#M857351</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi PK,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this question is about how to analyse which NAT statements are used and how often. (or unused). The config is quite complex and I suspect there are some NAT ways that were not intended and others that are not needed any more.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore, I´d like to have a report on NAT usage, like it is available on ACL usage (counters or via some tools like Firemon).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For dynamic NAT, I get syslog data that can be filtered for the corresponding expressions, so if I count them, this gives me a (complicated) way to get the info I want. For static, I can see that NAT rules are established, but I can´t see if there is data flowing across these NATs, i.e. if they are used at all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since there are hundreds of static entries, permit ACLs with counters are possible, but not really something I´d like to do &lt;SPAN __jive_emoticon_name="wink" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/wink.gif"&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there any tool liek Firegen or other log analysis tool that gathers statistic data about NAT usage ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Later,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Oliver&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Feb 2010 14:11:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388846#M857351</guid>
      <dc:creator>keller.oliver</dc:creator>
      <dc:date>2010-02-03T14:11:15Z</dc:date>
    </item>
    <item>
      <title>Re: NAT monitoring / syslog</title>
      <link>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388847#M857352</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hmm interesting question.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe just like the built dynamic translation syslog you can follow this syslog&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Feb 03 2010 09:04:01: %ASA-6-302013: Built inbound TCP connection 165172 for outside:10.117.14.69/51132 (10.117.14.69/51132) to inside:192.168.2.2/5900 (172.18.254.34/5900)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;305011: Built static TCP translation from inside:192.168.41.10/8501 to outside:a.b.c.d/80&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This one is for static.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Grep for syslog 302013 and 305011and see how of this your firewall logs in a day.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-KS&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Feb 2010 14:33:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388847#M857352</guid>
      <dc:creator>Kureli Sankar</dc:creator>
      <dc:date>2010-02-03T14:33:13Z</dc:date>
    </item>
    <item>
      <title>Re: NAT monitoring / syslog</title>
      <link>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388848#M857353</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess it´s time to reanimate my perl knowledge &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Right now I´m evaluating FireGen and Sawmill, since we´re on a budget we can´t spend a lot of money. Any other useful tools for syslogging PIXes and getting information out of the logdata ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Feb 2010 08:48:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388848#M857353</guid>
      <dc:creator>keller.oliver</dc:creator>
      <dc:date>2010-02-04T08:48:28Z</dc:date>
    </item>
    <item>
      <title>Re: NAT monitoring / syslog</title>
      <link>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388849#M857354</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is Cisco MARS that can do a lot with syslogs generate reports etc. But it is not free &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think you won't avoid writing perl again...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PK&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Feb 2010 14:08:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/nat-monitoring-syslog/m-p/1388849#M857354</guid>
      <dc:creator>Panos Kampanakis</dc:creator>
      <dc:date>2010-02-04T14:08:11Z</dc:date>
    </item>
  </channel>
</rss>

