<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Sysloging ACL violations in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/sysloging-acl-violations/m-p/320039#M97276</link>
    <description>&lt;P&gt;I have problem with configuring the alarms on IDS 4.1 when ACL violation syslog message is received. I have simple config on the router:&lt;/P&gt;&lt;P&gt;access-list 120 deny   ip any host 10.10.17.254 log&lt;/P&gt;&lt;P&gt;access-list 120 permit ip any any&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; ip address 10.10.17.254 255.255.254.0&lt;/P&gt;&lt;P&gt; ip access-group 120 in&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging 10.10.17.245&lt;/P&gt;&lt;P&gt;logging 10.10.17.17&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The syslogs are sent - I can see it on my second Syslog server. The 10.10.17.245 is a IDS4250XL.&lt;/P&gt;&lt;P&gt;The configuration of the custom signature is as follows:&lt;/P&gt;&lt;P&gt; SERVICE.SYSLOG&lt;/P&gt;&lt;P&gt;   -----------------------------------------------&lt;/P&gt;&lt;P&gt;      version: 4.0 &amp;lt;protected&amp;gt;&lt;/P&gt;&lt;P&gt;      signatures (min: 0, max: 1000, current: 1)&lt;/P&gt;&lt;P&gt;      -----------------------------------------------&lt;/P&gt;&lt;P&gt;         SIGID: 21000&lt;/P&gt;&lt;P&gt;         SubSig: 0 &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         AclDataSource: &lt;/P&gt;&lt;P&gt;         AclFilterName: &lt;/P&gt;&lt;P&gt;         AlarmDelayTimer: &lt;/P&gt;&lt;P&gt;         AlarmInterval: &lt;/P&gt;&lt;P&gt;         AlarmSeverity: medium &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         AlarmThrottle: FireAll &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         AlarmTraits: &lt;/P&gt;&lt;P&gt;         CapturePacket: False &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         ChokeThreshold: &lt;/P&gt;&lt;P&gt;         Enabled: True &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         EventAction: &lt;/P&gt;&lt;P&gt;         Facility: &lt;/P&gt;&lt;P&gt;         FlipAddr: &lt;/P&gt;&lt;P&gt;         MaxInspectLength: &lt;/P&gt;&lt;P&gt;         MaxTTL: &lt;/P&gt;&lt;P&gt;         MinHits: &lt;/P&gt;&lt;P&gt;         Priority: &lt;/P&gt;&lt;P&gt;         Protocol: IP default: UDP&lt;/P&gt;&lt;P&gt;         ResetAfterIdle: 15 &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         SigComment: &lt;/P&gt;&lt;P&gt;         SigName: SERVICE.SYSLOG &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         SigStringInfo: &lt;/P&gt;&lt;P&gt;         SigVersion: &lt;/P&gt;&lt;P&gt;         StorageKey: xxxx &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         SummaryKey: xxBx&lt;/P&gt;&lt;P&gt;         ThrottleInterval: 15 &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         WantFrag: &lt;/P&gt;&lt;P&gt;As I checked with nmap, UDP port 514 on IDS4250 is closed. How can I open it to get the syslogs? Or is there any other way to get the ACL violation logs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 09:14:28 GMT</pubDate>
    <dc:creator>k.lapczuk</dc:creator>
    <dc:date>2019-03-10T09:14:28Z</dc:date>
    <item>
      <title>Sysloging ACL violations</title>
      <link>https://community.cisco.com/t5/network-security/sysloging-acl-violations/m-p/320039#M97276</link>
      <description>&lt;P&gt;I have problem with configuring the alarms on IDS 4.1 when ACL violation syslog message is received. I have simple config on the router:&lt;/P&gt;&lt;P&gt;access-list 120 deny   ip any host 10.10.17.254 log&lt;/P&gt;&lt;P&gt;access-list 120 permit ip any any&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; ip address 10.10.17.254 255.255.254.0&lt;/P&gt;&lt;P&gt; ip access-group 120 in&lt;/P&gt;&lt;P&gt;logging trap debugging&lt;/P&gt;&lt;P&gt;logging 10.10.17.245&lt;/P&gt;&lt;P&gt;logging 10.10.17.17&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The syslogs are sent - I can see it on my second Syslog server. The 10.10.17.245 is a IDS4250XL.&lt;/P&gt;&lt;P&gt;The configuration of the custom signature is as follows:&lt;/P&gt;&lt;P&gt; SERVICE.SYSLOG&lt;/P&gt;&lt;P&gt;   -----------------------------------------------&lt;/P&gt;&lt;P&gt;      version: 4.0 &amp;lt;protected&amp;gt;&lt;/P&gt;&lt;P&gt;      signatures (min: 0, max: 1000, current: 1)&lt;/P&gt;&lt;P&gt;      -----------------------------------------------&lt;/P&gt;&lt;P&gt;         SIGID: 21000&lt;/P&gt;&lt;P&gt;         SubSig: 0 &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         AclDataSource: &lt;/P&gt;&lt;P&gt;         AclFilterName: &lt;/P&gt;&lt;P&gt;         AlarmDelayTimer: &lt;/P&gt;&lt;P&gt;         AlarmInterval: &lt;/P&gt;&lt;P&gt;         AlarmSeverity: medium &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         AlarmThrottle: FireAll &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         AlarmTraits: &lt;/P&gt;&lt;P&gt;         CapturePacket: False &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         ChokeThreshold: &lt;/P&gt;&lt;P&gt;         Enabled: True &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         EventAction: &lt;/P&gt;&lt;P&gt;         Facility: &lt;/P&gt;&lt;P&gt;         FlipAddr: &lt;/P&gt;&lt;P&gt;         MaxInspectLength: &lt;/P&gt;&lt;P&gt;         MaxTTL: &lt;/P&gt;&lt;P&gt;         MinHits: &lt;/P&gt;&lt;P&gt;         Priority: &lt;/P&gt;&lt;P&gt;         Protocol: IP default: UDP&lt;/P&gt;&lt;P&gt;         ResetAfterIdle: 15 &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         SigComment: &lt;/P&gt;&lt;P&gt;         SigName: SERVICE.SYSLOG &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         SigStringInfo: &lt;/P&gt;&lt;P&gt;         SigVersion: &lt;/P&gt;&lt;P&gt;         StorageKey: xxxx &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         SummaryKey: xxBx&lt;/P&gt;&lt;P&gt;         ThrottleInterval: 15 &amp;lt;defaulted&amp;gt;&lt;/P&gt;&lt;P&gt;         WantFrag: &lt;/P&gt;&lt;P&gt;As I checked with nmap, UDP port 514 on IDS4250 is closed. How can I open it to get the syslogs? Or is there any other way to get the ACL violation logs?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 09:14:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sysloging-acl-violations/m-p/320039#M97276</guid>
      <dc:creator>k.lapczuk</dc:creator>
      <dc:date>2019-03-10T09:14:28Z</dc:date>
    </item>
    <item>
      <title>Re: Sysloging ACL violations</title>
      <link>https://community.cisco.com/t5/network-security/sysloging-acl-violations/m-p/320040#M97281</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your signature definition is incomplete.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You need to specify:&lt;/P&gt;&lt;P&gt;AclDataSource: &lt;/P&gt;&lt;P&gt;AclFilterName: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AclDataSource is the IP Address of the router from which the syslog messages are being generated.  Look at your tcpdump output to confirm which of the router's ips is being used as the source address of the syslog packets.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;AclFilterName is the ACL Name/Number (in your case "120")&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It has been awhile since I have dealt with the syslog stuff, but if my memmory serves me the sensor does not actually open port 514.  Instead it sniffs the command and control port looking for specific packets (from the AclDataSource to the Sensor's Command and Control, UDP packet with destination port 514).  This prevents the sensor from being intentionally or accidentally flooded with syslog packets from other machines.  The syslogs sent to the sensor never get logged as syslog entries (the internal syslog is connected to any externally acessible port), instead they are sniffed by sensorApp, analyzed, and when needed turned into an IDS alarm.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Jan 2005 17:56:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sysloging-acl-violations/m-p/320040#M97281</guid>
      <dc:creator>marcabal</dc:creator>
      <dc:date>2005-01-21T17:56:04Z</dc:date>
    </item>
    <item>
      <title>Re: Sysloging ACL violations</title>
      <link>https://community.cisco.com/t5/network-security/sysloging-acl-violations/m-p/320041#M97286</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried it as well, with no success. Syslogs are sent with correct ip address (logging source-interface). I tried also the log-acl-violation=true in the Network Access section of the config but, it didn't help. Any other ideas?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 22 Jan 2005 21:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/sysloging-acl-violations/m-p/320041#M97286</guid>
      <dc:creator>k.lapczuk</dc:creator>
      <dc:date>2005-01-22T21:22:29Z</dc:date>
    </item>
  </channel>
</rss>

