08-02-2018 07:48 AM
Hi Experts,
I just need a simple yes or no. Does logging work for dACL's and if it does work how do we see the logging info?
Much appreciated,
-Robert
Solved! Go to Solution.
08-02-2018 10:05 AM
Ok, I'm testing with the 12port version of that switch. running code 15.2(6)E1
I also see hits:
Extended IP access list shure_acl 5 permit igmp any any (15 matches) 10 permit udp any eq snmptrap any 20 permit udp any range 319 320 any 30 permit udp any eq 2203 any 40 permit udp any eq 4321 any 50 permit udp any range 14336 14600 any 60 permit udp any eq 4440 any 70 permit udp any eq 4444 any 80 permit udp any eq 4455 any 90 permit udp any eq 5353 any (7 matches) 100 permit udp any range 8700 8706 any (275 matches) 110 permit udp any eq 8800 any 120 permit udp any eq 8751 any 130 permit udp any range 16000 65535 any 140 permit icmp any any 150 permit udp any any eq bootpc 160 permit udp any 10.0.0.0 0.255.255.255 eq ntp 170 permit tcp any 10.0.0.0 0.255.255.255 eq domain 180 permit udp any 10.0.0.0 0.255.255.255 eq domain 190 permit ip any host 10.200.105.31 200 permit ip any host 10.200.105.32 210 permit ip any host 10.200.105.33 220 permit ip any host 10.200.105.34 230 permit ip any host 10.200.105.35 240 deny ip any any log (98 matches)
However, ACE #240 with the 'log' syntax does not log to the switch buffer.
In other words, if I do a 'sh log' I never see any entries for the DACL.
08-02-2018 08:09 AM
08-02-2018 08:15 AM
TY much.
08-02-2018 08:09 AM
I just checked using a switch in my lab and was able to see if there were matches from a dACL sent by ISE. I used "show access-lists." Hope that helps
Regards,
Tim
08-02-2018 08:14 AM
Do you see actual hits? or just that the ACLs now exist on the device?
08-02-2018 08:17 AM
08-02-2018 08:19 AM
08-02-2018 08:25 AM
08-02-2018 08:31 AM
What model switch, and what version of code? Also, paste the output?
I had a tac case open for a good month (684684694 if you're interested). I have dacl logging working on one switch in our environment on a specific version of code. But this functionality isn't listed in any of the release notes as a new feature. Using the feature search tool gives no good results either.
08-02-2018 09:08 AM
Its a little 12 port switch used for testing.
S-SecurityTestDEV#sho ver
Cisco IOS Software, C3560CX Software (C3560CX-UNIVERSALK9-M), Version 15.2(4)E2, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2016 by Cisco Systems, Inc.
Compiled Mon 27-Jun-16 09:08 by prod_rel_team
ROM: Bootstrap program is C3560CX boot loader
BOOTLDR: C3560CX Boot Loader (C3560CX-HBOOT-M) Version 15.2(3r)E2, RELEASE SOFTWARE (fc2)
S-SecurityTestDEV uptime is 2 hours, 12 minutes
System returned to ROM by power-on
System restarted at 08:52:55 CDT Thu Aug 2 2018
System image file is "flash:/c3560cx-universalk9-mz.152-4.E2/c3560cx-universalk9-mz.152-4.E2.bin"
Last reload reason: power-on
Switch Ports Model SW Version SW Image
------ ----- ----- ---------- ----------
* 1 12 WS-C3560CX-8PC-S 15.2(4)E2 C3560CX-UNIVERSALK9-M
08-02-2018 10:05 AM
Ok, I'm testing with the 12port version of that switch. running code 15.2(6)E1
I also see hits:
Extended IP access list shure_acl 5 permit igmp any any (15 matches) 10 permit udp any eq snmptrap any 20 permit udp any range 319 320 any 30 permit udp any eq 2203 any 40 permit udp any eq 4321 any 50 permit udp any range 14336 14600 any 60 permit udp any eq 4440 any 70 permit udp any eq 4444 any 80 permit udp any eq 4455 any 90 permit udp any eq 5353 any (7 matches) 100 permit udp any range 8700 8706 any (275 matches) 110 permit udp any eq 8800 any 120 permit udp any eq 8751 any 130 permit udp any range 16000 65535 any 140 permit icmp any any 150 permit udp any any eq bootpc 160 permit udp any 10.0.0.0 0.255.255.255 eq ntp 170 permit tcp any 10.0.0.0 0.255.255.255 eq domain 180 permit udp any 10.0.0.0 0.255.255.255 eq domain 190 permit ip any host 10.200.105.31 200 permit ip any host 10.200.105.32 210 permit ip any host 10.200.105.33 220 permit ip any host 10.200.105.34 230 permit ip any host 10.200.105.35 240 deny ip any any log (98 matches)
However, ACE #240 with the 'log' syntax does not log to the switch buffer.
In other words, if I do a 'sh log' I never see any entries for the DACL.
08-02-2018 10:09 AM
04-29-2019 11:52 PM
I learned that these acls are processed in hardware and the hit count option is for access lists processed In software like the ones applied on SVI or layer 3 interfaces. So looks like you may not see the hits, unless the the switch you have processes this in a different way.
04-29-2019 11:52 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide