<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: zone-based fireall class-map access-list with 'log' not supp in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133485#M896751</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;why are you entering a "permit ip any any" in the first place? you first four lines are not even needed if you need the last line in the acl. aren't you trying match on specific traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 08 Sep 2008 03:39:16 GMT</pubDate>
    <dc:creator>palomoj</dc:creator>
    <dc:date>2008-09-08T03:39:16Z</dc:date>
    <item>
      <title>zone-based fireall class-map access-list with 'log' not supported...</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133484#M896750</link>
      <description>&lt;P&gt;I'm using IOS (c3845-advipservicesk9-mz.124-15.T3) zone-based firewall on a 3845 router and when I enable logging on an extended access list (permit ip any any log) that I have applied to a class-map, I get the following message:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"class-map my_cl_map : access-list with 'log' not supported, pls remove 'log' from access-list otherwise class-map my_cl_map will not work properly"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas what this means? If I apply permit any any log again, it will take it. But what are the consequences?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Relevant config:&lt;/P&gt;&lt;P&gt;class-map type inspect match-all my_cl_map&lt;/P&gt;&lt;P&gt; match class-map protocols&lt;/P&gt;&lt;P&gt; match access-group name my_acl&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended my_acl&lt;/P&gt;&lt;P&gt; permit icmp any any&lt;/P&gt;&lt;P&gt; permit tcp host 192.168.1.1 any eq 1022&lt;/P&gt;&lt;P&gt; permit tcp host 192.168.1.1  any eq 513&lt;/P&gt;&lt;P&gt; permit tcp host 192.168.1.1  any eq 514&lt;/P&gt;&lt;P&gt; permit ip any any log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 13:40:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133484#M896750</guid>
      <dc:creator>ydemissie</dc:creator>
      <dc:date>2019-03-11T13:40:58Z</dc:date>
    </item>
    <item>
      <title>Re: zone-based fireall class-map access-list with 'log' not supp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133485#M896751</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;why are you entering a "permit ip any any" in the first place? you first four lines are not even needed if you need the last line in the acl. aren't you trying match on specific traffic?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 03:39:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133485#M896751</guid>
      <dc:creator>palomoj</dc:creator>
      <dc:date>2008-09-08T03:39:16Z</dc:date>
    </item>
    <item>
      <title>Re: zone-based fireall class-map access-list with 'log' not supp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133486#M896752</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to capture what else is needed by doing "permit ip any any log". However, that's besides the point. Do you know why "log" in access lists applied to class-maps not allowed?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 11:56:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133486#M896752</guid>
      <dc:creator>y.demissie</dc:creator>
      <dc:date>2008-09-08T11:56:19Z</dc:date>
    </item>
    <item>
      <title>Re: zone-based fireall class-map access-list with 'log' not supp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133487#M896753</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;the acl is there to identify traffic for the policy, nothing else. you can bind another acl on the interface if you need to identify traffic using the log option&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 14:31:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133487#M896753</guid>
      <dc:creator>palomoj</dc:creator>
      <dc:date>2008-09-08T14:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: zone-based fireall class-map access-list with 'log' not supp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133488#M896755</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In other words, you have no idea what ""class-map my_cl_map : access-list with 'log' not supported, pls remove 'log' from access-list otherwise class-map my_cl_map will not work properly" means.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 08 Sep 2008 15:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133488#M896755</guid>
      <dc:creator>y.demissie</dc:creator>
      <dc:date>2008-09-08T15:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: zone-based fireall class-map access-list with 'log' not supp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133489#M896758</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I know what you mean. I would like to see log of deny/allow traffic. I have the same problem.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2009 03:37:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133489#M896758</guid>
      <dc:creator>ken.chua</dc:creator>
      <dc:date>2009-02-19T03:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: zone-based fireall class-map access-list with 'log' not supp</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133490#M896760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In other words you don't understand english too well. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"the acl is there to identify traffic for the policy, nothing else. "&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Identifying traffic with an ACL using a log option isn't going to identify the traffic correctly. If you want to see what's dropped, use the "drop log" in the policy-map for class class-default.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 19 Feb 2009 19:42:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-fireall-class-map-access-list-with-log-not-supported/m-p/1133490#M896760</guid>
      <dc:creator>palomoj</dc:creator>
      <dc:date>2009-02-19T19:42:03Z</dc:date>
    </item>
  </channel>
</rss>

