<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Logging ACL permit statements  in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/logging-acl-permit-statements/m-p/986191#M938252</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is very easy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt; logging on&lt;/P&gt;&lt;P&gt; logging timestamp&lt;/P&gt;&lt;P&gt; logging facility 19 &lt;/P&gt;&lt;P&gt; logging host outside 192.168.15.10&lt;/P&gt;&lt;P&gt; logging trap 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you have this, assume your syslog server&lt;/P&gt;&lt;P&gt;is 192.168.15.10 and it is Linux, modify the&lt;/P&gt;&lt;P&gt;/etc/syslog.conf to include this line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;local3.*                  /var/log/cisco.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;make sure you allow syslog to your linux box&lt;/P&gt;&lt;P&gt;in the /etc/sysconfig/syslog file:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Options to syslogd&lt;/P&gt;&lt;P&gt;# -m 0 disables 'MARK' messages.&lt;/P&gt;&lt;P&gt;# -r enables logging from remote machines&lt;/P&gt;&lt;P&gt;# -x disables DNS lookups on messages recieved with -r&lt;/P&gt;&lt;P&gt;# See syslogd(8) for more details&lt;/P&gt;&lt;P&gt;SYSLOGD_OPTIONS="-m 0 -r -x"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;restart your syslog with "service syslog restart"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now do this:  tail -f /var/log/cisco.log | grep 192.168.15.25 where 192.168.15.25 is the&lt;/P&gt;&lt;P&gt;External IP address of my Pix firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May  5 22:28:20 192.168.15.25 May 06 2008 00:47:05: %PIX-6-106100: access-list External permitted tcp outside/172.20.20.1(33563) -&amp;gt; inside/192.168.15.70(139) hit-cnt 1 first hit&lt;/P&gt;&lt;P&gt;May  5 22:28:20 192.168.15.25 May 06 2008 00:47:05: %PIX-6-302013: Built inbound TCP connection 237480 for outside:172.20.20.1/33563 (172.20.20.1/33563) to inside:192.168.4.70/139 (192.168.15.70/139)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using NebBiOS as an example but you get&lt;/P&gt;&lt;P&gt;the idea.  You may also want to supress lot&lt;/P&gt;&lt;P&gt;of translation messages with "no logging&lt;/P&gt;&lt;P&gt;message xxxxxx"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easy right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCIE Security&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 05 May 2008 23:33:30 GMT</pubDate>
    <dc:creator>cisco24x7</dc:creator>
    <dc:date>2008-05-05T23:33:30Z</dc:date>
    <item>
      <title>Logging ACL permit statements</title>
      <link>https://community.cisco.com/t5/network-security/logging-acl-permit-statements/m-p/986190#M938251</link>
      <description>&lt;P&gt;I have a customer with a PIX 515 running 6.3.  They have an appliance running a web server and they allow port 80 to a public IP.  This is working but they want to log the actual IPs being used to access the web server.  They have this currently:&lt;/P&gt;&lt;P&gt;access-list out_in permit tcp any host 1.2.3.4 eq https&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've tried&lt;/P&gt;&lt;P&gt;access-list out_in permit tcp any host 1.2.3.4 eq https log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but this does not generate any syslog messages.  I tried using log-input but it gives me an extra command arguement(s).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The customer doesn't have access to the external router so is there any way to record the IP addresses that are being allowed through this acl?  The appliance has a log but it does not include this information and is not customizable.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 12:40:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-acl-permit-statements/m-p/986190#M938251</guid>
      <dc:creator>nutflush11</dc:creator>
      <dc:date>2019-03-11T12:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: Logging ACL permit statements</title>
      <link>https://community.cisco.com/t5/network-security/logging-acl-permit-statements/m-p/986191#M938252</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This is very easy:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;conf t&lt;/P&gt;&lt;P&gt; logging on&lt;/P&gt;&lt;P&gt; logging timestamp&lt;/P&gt;&lt;P&gt; logging facility 19 &lt;/P&gt;&lt;P&gt; logging host outside 192.168.15.10&lt;/P&gt;&lt;P&gt; logging trap 6&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you have this, assume your syslog server&lt;/P&gt;&lt;P&gt;is 192.168.15.10 and it is Linux, modify the&lt;/P&gt;&lt;P&gt;/etc/syslog.conf to include this line:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;local3.*                  /var/log/cisco.log&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;make sure you allow syslog to your linux box&lt;/P&gt;&lt;P&gt;in the /etc/sysconfig/syslog file:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;# Options to syslogd&lt;/P&gt;&lt;P&gt;# -m 0 disables 'MARK' messages.&lt;/P&gt;&lt;P&gt;# -r enables logging from remote machines&lt;/P&gt;&lt;P&gt;# -x disables DNS lookups on messages recieved with -r&lt;/P&gt;&lt;P&gt;# See syslogd(8) for more details&lt;/P&gt;&lt;P&gt;SYSLOGD_OPTIONS="-m 0 -r -x"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;restart your syslog with "service syslog restart"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now do this:  tail -f /var/log/cisco.log | grep 192.168.15.25 where 192.168.15.25 is the&lt;/P&gt;&lt;P&gt;External IP address of my Pix firewall:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;May  5 22:28:20 192.168.15.25 May 06 2008 00:47:05: %PIX-6-106100: access-list External permitted tcp outside/172.20.20.1(33563) -&amp;gt; inside/192.168.15.70(139) hit-cnt 1 first hit&lt;/P&gt;&lt;P&gt;May  5 22:28:20 192.168.15.25 May 06 2008 00:47:05: %PIX-6-302013: Built inbound TCP connection 237480 for outside:172.20.20.1/33563 (172.20.20.1/33563) to inside:192.168.4.70/139 (192.168.15.70/139)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am using NebBiOS as an example but you get&lt;/P&gt;&lt;P&gt;the idea.  You may also want to supress lot&lt;/P&gt;&lt;P&gt;of translation messages with "no logging&lt;/P&gt;&lt;P&gt;message xxxxxx"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Easy right?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;CCIE Security&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 May 2008 23:33:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-acl-permit-statements/m-p/986191#M938252</guid>
      <dc:creator>cisco24x7</dc:creator>
      <dc:date>2008-05-05T23:33:30Z</dc:date>
    </item>
  </channel>
</rss>

