06-10-2016 09:08 AM - edited 03-12-2019 12:52 AM
The default for access rules is to enable logging. Our older ASA is running at 80 percent CPU usage.
The ASA Logging filters is set at:
Internal Buffer - Severity Debugging
ASDM - Severity Informational
Syslog Servers - Severity Informational
I'm trying to make the case for disabling logging of all rules and instead only log rules that we want to receive alerts for. We can enable logging on specific rules later for troubleshooting purposes if necessary. The syslog traffic alone is overwhelming the syslog server and filling the disk on a daily basis.
How much of an impact does this level of logging have on the ASA's performance?
What CLI commands can I use to measure the impact on processes before and after making the changes to logging?
Thanks!
Solved! Go to Solution.
06-10-2016 06:48 PM
Hi,
Please use the command sh process
Regards,
Aditya
Please rate helpful posts and mark correct answers.
06-10-2016 02:28 PM
I assume you have no debugging running?
Do you actually need syslog to log every flow? If you drop baccked to "warnings" if you only log dropped flows.
06-12-2016 12:01 PM
I don't believe that we need to log every flow. I recently took over management of this firewall. I'd like to disable logging on most of those rules and also only send admin commands as well as errors to syslog, but I have to convince my boss of the need to change things as he previously managed the firewall and all changes must be approved by him.
06-10-2016 06:48 PM
Hi,
Please use the command sh process
Regards,
Aditya
Please rate helpful posts and mark correct answers.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide