<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using EEM to identify destination port of incoming traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/using-eem-to-identify-destination-port-of-incoming-traffic/m-p/1372679#M945837</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I made a modification to the script that clears the log file after it runs....that appears to hav fixed the issue with it reading the port information from the first syslog message.&amp;nbsp;&amp;nbsp;&amp;nbsp; But the script only works when being debugged ("debug event man action cli") and then only gets "NO MATCH" when debugging is disabled.&amp;nbsp; Yikes!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HPR#show run | b event&lt;BR /&gt;event manager applet REDIRECT&lt;BR /&gt; event syslog pattern "IPACCESSLOGP:"&lt;BR /&gt; action 10&amp;nbsp; cli command "enable"&lt;BR /&gt; action 100 cli command "show log | i IPACCESSLOGP"&lt;BR /&gt; action 105 wait 2&lt;BR /&gt; action 120 regexp "[0-9.]+\)," "$_cli_result" result&lt;BR /&gt; action 130 if $_regexp_result eq 1&lt;BR /&gt; action 135&amp;nbsp; string trimright "$result" "),"&lt;BR /&gt; action 140&amp;nbsp; puts "PORT:$_string_result"&lt;BR /&gt; action 145&amp;nbsp; cli command "tclsh clearlog.tcl"&lt;BR /&gt; action 150 else&lt;BR /&gt; action 160&amp;nbsp; puts "NO MATCH"&lt;BR /&gt; action 170 end&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the debug:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!NO DEBUG: SENDING PACKETS ON PORT 666 (NO MATCH)&lt;/P&gt;&lt;P&gt;HPR#&lt;BR /&gt;*Dec 10 14:47:18.511: %SEC-6-IPACCESSLOGP: list 100 permitted tcp 192.168.194.1(7908) -&amp;gt; 192.168.194.100(666), 1 packet&lt;/P&gt;&lt;P&gt;*Dec 10 14:47:20.883: %HA_EM-6-LOG: REDIRECT: NO MATCH&lt;/P&gt;&lt;P&gt;!NO DEBUG: SENDING PACKETS ON PORT 667 (PORT:666 displayed)&lt;/P&gt;&lt;P&gt;HPR#&lt;BR /&gt;*Dec 10 14:47:33.259: %SEC-6-IPACCESSLOGP: list 100 permitted tcp 192.168.194.1(7912) -&amp;gt; 192.168.194.100(667), 1 packet&lt;/P&gt;&lt;P&gt;*Dec 10 14:47:35.639: %HA_EM-6-LOG: REDIRECT: PORT:666&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!CLEARED LOG AND ENABLED DEBUGGING ("debug event man action cli")&lt;/P&gt;&lt;P&gt;HPR#clear log&lt;BR /&gt;Clear logging buffer [confirm]&lt;/P&gt;&lt;P&gt;HPR#debug event man action cli&lt;BR /&gt;Debug EEM action cli debugging is on&lt;BR /&gt;HPR#&lt;BR /&gt;HPR#clear log&lt;BR /&gt;Clear logging buffer [confirm]&lt;/P&gt;&lt;P&gt;!SENDING PACKETS ON PORT 668 (WIN!)&lt;/P&gt;&lt;P&gt;HPR#&lt;BR /&gt;*Dec 10 14:48:05.927: %SEC-6-IPACCESSLOGP: list 100 permitted tcp 192.168.194.1(7918) -&amp;gt; 192.168.194.100(668), 1 packet&lt;/P&gt;&lt;P&gt;*Dec 10 14:48:06.003: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_open called.&lt;BR /&gt;*Dec 10 14:48:06.019: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR&amp;gt;&lt;BR /&gt;*Dec 10 14:48:06.019: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR&amp;gt;enable&lt;BR /&gt;*Dec 10 14:48:06.039: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:06.043: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR#show log | i IPACCESSLOGP&lt;/P&gt;&lt;P&gt;*Dec 10 14:48:06.287: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : *Dec 10 14:48:05.927: %SEC-6-IPACCESSLOGP: list&lt;BR /&gt;100 permitted tcp 192.168.194.1(7918) -&amp;gt; 192.168.194.100(668), 1 packet&lt;BR /&gt;*Dec 10 14:48:06.287: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:08.299: %HA_EM-6-LOG: REDIRECT: PORT:&lt;STRONG&gt;668&lt;/STRONG&gt;&lt;BR /&gt;*Dec 10 14:48:08.303: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR#tclsh clearlog.tcl&lt;BR /&gt;*Dec 10 14:48:08.543: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:08.547: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_close called.&lt;/P&gt;&lt;P&gt;!SENDING PACKETS ON PORT 669 (WIN!)&lt;/P&gt;&lt;P&gt;*Dec 10 14:48:11.499: %SEC-6-IPACCESSLOGP: list 100 permitted tcp 192.168.194.1(7921) -&amp;gt; 192.168.194.100(669), 1 packet&lt;/P&gt;&lt;P&gt;*Dec 10 14:48:11.579: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_open called.&lt;BR /&gt;*Dec 10 14:48:11.591: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR&amp;gt;&lt;BR /&gt;*Dec 10 14:48:11.595: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR&amp;gt;enable&lt;BR /&gt;*Dec 10 14:48:11.615: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:11.615: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR#show log | i IPACCESSLOGP&lt;BR /&gt;*Dec 10 14:48:11.879: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : *Dec 10 14:48:11.499: %SEC-6-IPACCESSLOGP: list&lt;BR /&gt;100 permitted tcp 192.168.194.1(7921) -&amp;gt; 192.168.194.100(669), 1 packet&lt;BR /&gt;*Dec 10 14:48:11.879: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:13.891: %HA_EM-6-LOG: REDIRECT: PORT:&lt;STRONG&gt;669&lt;/STRONG&gt;&lt;BR /&gt;*Dec 10 14:48:13.895: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR#tclsh clearlog.tcl&lt;BR /&gt;*Dec 10 14:48:14.123: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:14.127: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_close called.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 10 Dec 2009 21:46:28 GMT</pubDate>
    <dc:creator>jjunginger</dc:creator>
    <dc:date>2009-12-10T21:46:28Z</dc:date>
    <item>
      <title>Using EEM to identify destination port of incoming traffic</title>
      <link>https://community.cisco.com/t5/network-security/using-eem-to-identify-destination-port-of-incoming-traffic/m-p/1372678#M945832</link>
      <description>&lt;P&gt;I'm using the following script to pull out the source port from a syslog message generated by an ACL.&amp;nbsp; The intent is to grab the destination port for use later in the script:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;no event manager applet REDIRECT&lt;BR /&gt;event manager applet REDIRECT&lt;BR /&gt;event syslog pattern "IPACCESSLOGP:"&lt;BR /&gt;action 10&amp;nbsp; cli command "enable"&lt;BR /&gt;action 15&amp;nbsp; wait 2&lt;BR /&gt;action 100 cli command "show log | i IPACCESSLOGP"&lt;BR /&gt;action 105 wait 2&lt;BR /&gt;action 120 regexp "[0-9.]+\)," "$_cli_result" result&lt;BR /&gt;action 130 if $_regexp_result eq 1&lt;BR /&gt;action 135&amp;nbsp; string trimright "$result" "),"&lt;BR /&gt;action 140&amp;nbsp; puts "PORT:$_string_result"&lt;BR /&gt;action 150 else&lt;BR /&gt;action 160&amp;nbsp; puts "NO MATCH"&lt;BR /&gt;action 170 end&lt;BR /&gt;!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The isssue is that if the logging buffer has no entries, the script appears to grab the port correctly.&amp;nbsp; If there are multiple ACL syslog messages, it will process the first one it finds and print out the port correctly.&amp;nbsp; I have debugged "event man action cli" and cannot determine why the match is failing (output below):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HPR#clear log&lt;BR /&gt;Clear logging buffer [confirm]&lt;/P&gt;&lt;P&gt;!HERE IS THE FIRST PACKET DESTINED FOR PORT &lt;STRONG&gt;31340&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;HPR#&lt;BR /&gt;*Dec 10 14:15:05.939: %SEC-6-IPACCESSLOGP: list 100 permitted tcp 192.168.194.1(7379) -&amp;gt; 192.168.194.100(31340), 1 packe&lt;BR /&gt;t&lt;BR /&gt;*Dec 10 14:15:06.015: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_open called.&lt;BR /&gt;*Dec 10 14:15:06.027: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR&amp;gt;&lt;BR /&gt;*Dec 10 14:15:06.027: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR&amp;gt;enable&lt;BR /&gt;*Dec 10 14:15:06.051: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:15:06.051: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR#show log | i IPACCESSLOGP&lt;BR /&gt;*Dec 10 14:15:06.311: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : *Dec 10 14:15:05.939: %SEC-6-IPACCESSLOGP: list&lt;BR /&gt;100 permitted tcp 192.168.194.1(7379) -&amp;gt; 192.168.194.100(31340), 1 packet&lt;BR /&gt;*Dec 10 14:15:06.311: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:15:08.327: %HA_EM-6-LOG: REDIRECT: PORT:&lt;STRONG&gt;31340&lt;BR /&gt;&lt;/STRONG&gt;*Dec 10 14:15:10.327: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_close called.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!HERE IS THE FIRST PACKET DESTINED FOR PORT&lt;STRONG&gt; 31341&lt;/STRONG&gt;:&lt;/P&gt;&lt;P&gt;HPR#&lt;BR /&gt;*Dec 10 14:15:46.439: %SEC-6-IPACCESSLOGP: list 100 permitted tcp 192.168.194.1(7388) -&amp;gt; 192.168.194.100(31341), 1 packe&lt;BR /&gt;t&lt;BR /&gt;*Dec 10 14:15:46.515: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_open called.&lt;BR /&gt;*Dec 10 14:15:46.527: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR&amp;gt;&lt;BR /&gt;*Dec 10 14:15:46.531: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR&amp;gt;enable&lt;BR /&gt;*Dec 10 14:15:46.551: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:15:46.551: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR#show log | i IPACCESSLOGP&lt;BR /&gt;*Dec 10 14:15:46.831: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : *Dec 10 14:15:05.939: %SEC-6-IPACCESSLOGP: list&lt;BR /&gt;100 permitted tcp 192.168.194.1(7379) -&amp;gt; 192.168.194.100(31340), 1 packet&lt;BR /&gt;*Dec 10 14:15:46.831: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : *Dec 10 14:15:06.051: %HA_EM-6-LOG: REDIRECT : D&lt;BR /&gt;EBUG(cli_lib) : : IN&amp;nbsp; : HPR#show log | i IPACCESSLOGP&lt;BR /&gt;*Dec 10 14:15:46.835: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : *Dec 10 14:15:06.311: %HA_EM-6-LOG: REDIRECT : D&lt;BR /&gt;EBUG(cli_lib) : : OUT : *Dec 10 14:15:05.939: %SEC-6-IPACCESSLOGP: list 100 permitted tcp 192.168.194.1(7379) -&amp;gt; 192.168&lt;BR /&gt;.194.100(31340), 1 packet&lt;BR /&gt;*Dec 10 14:15:46.835: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : *Dec 10 14:15:46.439: %SEC-6-IPACCESSLOGP: list&lt;BR /&gt;100 permitted tcp 192.168.194.1(7388) -&amp;gt; 192.168.194.100(31341), 1 packet&lt;BR /&gt;*Dec 10 14:15:46.835: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:15:48.847: %HA_EM-6-LOG: REDIRECT: PORT:&lt;STRONG&gt;31340&lt;BR /&gt;&lt;/STRONG&gt;*Dec 10 14:15:50.847: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_close called.&lt;/P&gt;&lt;P&gt;Is there a more precise way to pull just the information about the message that triggered the EEM applet (like an environment variable that I could match on and pull the port info out with a regex?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 11:49:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-eem-to-identify-destination-port-of-incoming-traffic/m-p/1372678#M945832</guid>
      <dc:creator>jjunginger</dc:creator>
      <dc:date>2020-02-21T11:49:34Z</dc:date>
    </item>
    <item>
      <title>Re: Using EEM to identify destination port of incoming traffic</title>
      <link>https://community.cisco.com/t5/network-security/using-eem-to-identify-destination-port-of-incoming-traffic/m-p/1372679#M945837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I made a modification to the script that clears the log file after it runs....that appears to hav fixed the issue with it reading the port information from the first syslog message.&amp;nbsp;&amp;nbsp;&amp;nbsp; But the script only works when being debugged ("debug event man action cli") and then only gets "NO MATCH" when debugging is disabled.&amp;nbsp; Yikes!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HPR#show run | b event&lt;BR /&gt;event manager applet REDIRECT&lt;BR /&gt; event syslog pattern "IPACCESSLOGP:"&lt;BR /&gt; action 10&amp;nbsp; cli command "enable"&lt;BR /&gt; action 100 cli command "show log | i IPACCESSLOGP"&lt;BR /&gt; action 105 wait 2&lt;BR /&gt; action 120 regexp "[0-9.]+\)," "$_cli_result" result&lt;BR /&gt; action 130 if $_regexp_result eq 1&lt;BR /&gt; action 135&amp;nbsp; string trimright "$result" "),"&lt;BR /&gt; action 140&amp;nbsp; puts "PORT:$_string_result"&lt;BR /&gt; action 145&amp;nbsp; cli command "tclsh clearlog.tcl"&lt;BR /&gt; action 150 else&lt;BR /&gt; action 160&amp;nbsp; puts "NO MATCH"&lt;BR /&gt; action 170 end&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here's the debug:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!NO DEBUG: SENDING PACKETS ON PORT 666 (NO MATCH)&lt;/P&gt;&lt;P&gt;HPR#&lt;BR /&gt;*Dec 10 14:47:18.511: %SEC-6-IPACCESSLOGP: list 100 permitted tcp 192.168.194.1(7908) -&amp;gt; 192.168.194.100(666), 1 packet&lt;/P&gt;&lt;P&gt;*Dec 10 14:47:20.883: %HA_EM-6-LOG: REDIRECT: NO MATCH&lt;/P&gt;&lt;P&gt;!NO DEBUG: SENDING PACKETS ON PORT 667 (PORT:666 displayed)&lt;/P&gt;&lt;P&gt;HPR#&lt;BR /&gt;*Dec 10 14:47:33.259: %SEC-6-IPACCESSLOGP: list 100 permitted tcp 192.168.194.1(7912) -&amp;gt; 192.168.194.100(667), 1 packet&lt;/P&gt;&lt;P&gt;*Dec 10 14:47:35.639: %HA_EM-6-LOG: REDIRECT: PORT:666&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;!CLEARED LOG AND ENABLED DEBUGGING ("debug event man action cli")&lt;/P&gt;&lt;P&gt;HPR#clear log&lt;BR /&gt;Clear logging buffer [confirm]&lt;/P&gt;&lt;P&gt;HPR#debug event man action cli&lt;BR /&gt;Debug EEM action cli debugging is on&lt;BR /&gt;HPR#&lt;BR /&gt;HPR#clear log&lt;BR /&gt;Clear logging buffer [confirm]&lt;/P&gt;&lt;P&gt;!SENDING PACKETS ON PORT 668 (WIN!)&lt;/P&gt;&lt;P&gt;HPR#&lt;BR /&gt;*Dec 10 14:48:05.927: %SEC-6-IPACCESSLOGP: list 100 permitted tcp 192.168.194.1(7918) -&amp;gt; 192.168.194.100(668), 1 packet&lt;/P&gt;&lt;P&gt;*Dec 10 14:48:06.003: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_open called.&lt;BR /&gt;*Dec 10 14:48:06.019: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR&amp;gt;&lt;BR /&gt;*Dec 10 14:48:06.019: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR&amp;gt;enable&lt;BR /&gt;*Dec 10 14:48:06.039: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:06.043: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR#show log | i IPACCESSLOGP&lt;/P&gt;&lt;P&gt;*Dec 10 14:48:06.287: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : *Dec 10 14:48:05.927: %SEC-6-IPACCESSLOGP: list&lt;BR /&gt;100 permitted tcp 192.168.194.1(7918) -&amp;gt; 192.168.194.100(668), 1 packet&lt;BR /&gt;*Dec 10 14:48:06.287: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:08.299: %HA_EM-6-LOG: REDIRECT: PORT:&lt;STRONG&gt;668&lt;/STRONG&gt;&lt;BR /&gt;*Dec 10 14:48:08.303: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR#tclsh clearlog.tcl&lt;BR /&gt;*Dec 10 14:48:08.543: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:08.547: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_close called.&lt;/P&gt;&lt;P&gt;!SENDING PACKETS ON PORT 669 (WIN!)&lt;/P&gt;&lt;P&gt;*Dec 10 14:48:11.499: %SEC-6-IPACCESSLOGP: list 100 permitted tcp 192.168.194.1(7921) -&amp;gt; 192.168.194.100(669), 1 packet&lt;/P&gt;&lt;P&gt;*Dec 10 14:48:11.579: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_open called.&lt;BR /&gt;*Dec 10 14:48:11.591: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR&amp;gt;&lt;BR /&gt;*Dec 10 14:48:11.595: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR&amp;gt;enable&lt;BR /&gt;*Dec 10 14:48:11.615: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:11.615: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR#show log | i IPACCESSLOGP&lt;BR /&gt;*Dec 10 14:48:11.879: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : *Dec 10 14:48:11.499: %SEC-6-IPACCESSLOGP: list&lt;BR /&gt;100 permitted tcp 192.168.194.1(7921) -&amp;gt; 192.168.194.100(669), 1 packet&lt;BR /&gt;*Dec 10 14:48:11.879: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:13.891: %HA_EM-6-LOG: REDIRECT: PORT:&lt;STRONG&gt;669&lt;/STRONG&gt;&lt;BR /&gt;*Dec 10 14:48:13.895: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : IN&amp;nbsp; : HPR#tclsh clearlog.tcl&lt;BR /&gt;*Dec 10 14:48:14.123: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : OUT : HPR#&lt;BR /&gt;*Dec 10 14:48:14.127: %HA_EM-6-LOG: REDIRECT : DEBUG(cli_lib) : : CTL : cli_close called.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thoughts?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 10 Dec 2009 21:46:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/using-eem-to-identify-destination-port-of-incoming-traffic/m-p/1372679#M945837</guid>
      <dc:creator>jjunginger</dc:creator>
      <dc:date>2009-12-10T21:46:28Z</dc:date>
    </item>
  </channel>
</rss>

