EasyManuals Logo
Home>Cisco>Firewall>5510 - ASA SSL / IPsec VPN Edition

Cisco 5510 - ASA SSL / IPsec VPN Edition User Manual

Cisco 5510 - ASA SSL / IPsec VPN Edition
2164 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1972 background imageLoading...
Page #1972 background image
1-6
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Logging
Configuring Logging
Firewall Mode Guidelines
Supported in routed and transparent firewall modes.
IPv6 Guidelines
Does not support IPv6.
Additional Guidelines
• Sending syslogs over TCP is not supported on a standby ASA.
• The ASA supports the configuration of 16 syslog servers with the logging host command in single
context mode. In multiple context mode, the limitation is 4 servers per context.
• When you use a custom message list to match only access list hits, the access list logs are not
generated for access lists that have had their logging severity level increased to debugging (level 7).
The default logging severity level is set to 6 for the logging list command. This default behavior is
by design. When you explicitly change the logging severity level of the access list configuration to
debugging, you must also change the logging configuration itself.
The following is sample output from the show running-config logging command that will not
include access list hits, because their logging severity level has been changed to debugging:
hostname# show running-config logging
logging enable
logging timestamp
logging list test message 106100
logging buffered test
The following is sample output from the show running-config logging command that will include
access list hits:
hostname# show running-config logging
logging enable
logging timestamp
logging buffered debugging
In this case, the access list configuration does not change and the number of access list hits appears,
as shown in the following example:
hostname(config)# access-list global line 1 extended permit icmp any host 4.2.2.2 log
debugging interval 1 (hitcnt=7) 0xf36b5386
hostname(config)# access-list global line 2 extended permit tcp host 10.1.1.2 any eq
www log informational interval 1 (hitcnt=18) 0xe7e7c3b8
hostname(config)# access-list global line 3 extended permit ip any any (hitcnt=543)
0x25f9e609
Configuring Logging
This section describes how to configure logging and includes the following topics:
• Enabling Logging, page 1-7
• Configuring an Output Destination, page 1-7
Note The minimum configuration depends on what you want to do and what your requirements are for
handling syslog messages in the ASA and ASASM.

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals