12-20-2018 07:57 AM - edited 02-21-2020 08:35 AM
Hi,
is there a way to globally log all ACL to syslog instead of having the word "log" at the end of each rule? On the ASA platform.
It's for testing purpose.
thanks
12-20-2018 09:53 AM
What do you want to achieve? Do you want to see all that is allowed through the firewall? Then the connection-log can be used instead of the ACL-log.
12-20-2018 10:12 AM
Hi,
in fact, we want a syslog message every time a packet pass through a rule and know if it's permit or deny.
thanks
12-20-2018 12:08 PM
The ASA is a stateful firewall and you don't act on packets, you act on connections when something is allowed. That can easily be done with connection-logging.
01-18-2019 06:38 AM
How do you configure connection logging? Any documentation you can refer me to?
Thanks.
01-18-2019 06:50 AM
01-18-2019 07:39 AM
So I guess "connection logging" means logging Built outbound/inbound message like those?
%ASA-6-302013: Built outbound TCP connection 17316 for OUTSIDE:10.X.X.X/443 (10.X.X.X/443) to INSIDE:10.X.X.X/54129 (10.X.X.X/54129)
%ASA-6-302015: Built outbound UDP connection 17349 for OUTSIDE:10.X.X.X/53 (10.X.X.X/53) to INSIDE:10.X.X.X/55242 (10.X.X.X/55242)
%ASA-6-302020: Built outbound ICMP connection for faddr 10.X.X.X/0 gaddr 10.X.X.X/1 laddr 10.X.X.X/1
01-18-2019 08:08 AM - edited 01-18-2019 08:09 AM
These are the syslog IDs in case if you are interested and yes these are connection logging.
%ASA-6-302013 - Built outbound/inbound TCP connection
%ASA-6-302014 - Teardown TCP connection
%ASA-6-302015: Built outbound/inbound UDP connection
%ASA-6-302016: Teardown UDP connection
%ASA-6-302020: Built outbound/inbound ICMP connection
%ASA-6-302021: Teardown ICMP connection
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide