10-29-2024 06:38 AM
I have an ASA at a remote location that connects back to the DC through VPN. I use a loopback interface on the ASA for remote management and I've also configured that loopback to talk to our syslog server in the DC. However the syslog is only getting user events from the ASA, such as changes that I make on the firewall and my SSH logins. Is there a way to send allowed and denied traffic going through the firewall to the syslog if I'm using a loopback interface ? For reference this is the command I'm using to talk to syslog "logging host <loopback> <syslog IP> <syslog port>"
10-29-2024 06:55 AM
@Rayman99 hi, check if below links helps your requirement
10-29-2024 07:15 AM - edited 10-29-2024 07:25 AM
if you add log in end of ACL then each permit/deny will generate log and send can send to syslog
Send ACL logs to syslog in ASA | Security
MHM
10-30-2024 06:53 AM
I tried that and is not working.
10-30-2024 07:16 AM
Can I see the config of logging and acl ?
MHM
10-29-2024 07:19 AM
logging source-interface ?
10-30-2024 08:13 AM - edited 10-30-2024 08:15 AM
Hi,
What is your ASA version? Looks like syslog with Loopback support was added in 9.18(2) build: https://www.cisco.com/c/en/us/td/docs/security/asa/asa920/configuration/general/asa-920-general-config/interface-loopback.pdf
Also, technically speaking, you would need to set Loopback as "management-access", however not sure if it's functional or required for Loopback: https://www.cisco.com/c/en/us/support/docs/security/adaptive-security-appliance-asa-software/116171-qanda-asa-00.html
Best,
Cristian.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide