16-19
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 16 Identifying Traffic with Access Lists
Logging Access List Activity
The following is an example of an absolute time range beginning at 8:00 a.m. on January 1, 2006.
Because no end time and date are specified, the time range is in effect indefinitely.
hostname(config)#
time-range for2006
hostname(config-time-range)#
absolute start 8:00 1 january 2006
The following is an example of a weekly periodic time range from 8:00 a.m. to 6:00 p.m on weekdays.:
hostname(config)#
time-range workinghours
hostname(config-time-range)#
periodic weekdays 8:00 to 18:00
Applying the Time Range to an ACE
To apply the time range to an ACE, use the following command:
hostname(config)#
access-list
access_list_name
[
extended
]
{
deny
|
permit
}...
[
time-range
name
]
See the
“Adding an Extended Access List” section on page 16-5
for complete
access-list
command
syntax.
Note
If you also enable logging for the ACE, use the
log
keyword before the
time-range
keyword. If you
disable the ACE using the
inactive
keyword, use the
inactive
keyword as the last keyword.
The following example binds an access list named “Sales” to a time range named “New_York_Minute.”
hostname(config)#
access-list Sales line 1 extended deny tcp host 209.165.200.225 host
209.165.201.1 time-range New_York_Minute
Logging Access List Activity
This section describes how to configure access list logging for extended access lists and Webtype access
lists.
This section includes the following topics:
•
Access List Logging Overview, page 16-19
•
Configuring Logging for an Access Control Entry, page 16-20
•
Managing Deny Flows, page 16-21
Access List Logging Overview
By default, when traffic is denied by an extended ACE or a Webtype ACE, the security appliance
generates system message 106023 for each denied packet, in the following form:
%ASA|PIX-4-106023: Deny
protocol
src [
interface_name
:
source_address
/
source_port
] dst
interface_name
:
dest_address
/
dest_port
[type {
string
}, code {
code
}] by access_group
acl_id
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......