1-4
Cisco ASA Series CLI Configuration Guide
Chapter 1 Configuring Logging for Access Lists
Configuring Logging for Access Lists
To configure logging for an ACE, enter the following command:
Monitoring Access Lists
To monitor access lists, enter one of the following commands:
Configuration Examples for Access List Logging
This section includes sample configurations for logging access lists.
You might configure the following access list:
hostname(config)#
access-list outside-acl permit ip host 1.1.1.1 any log 7 interval 600
hostname(config)#
access-list outside-acl permit ip host 2.2.2.2 any
hostname(config)#
access-list outside-acl deny ip any any log 2
hostname(config)#
access-group outside-acl in interface outside
Command
Purpose
access-list
access_list_name
[
extended
]
{
deny
|
permit
}...
[
log
[[
level
] [
interval
secs
] |
disable
|
default
]]
Example:
hostname(config)# access-list outside-acl
permit ip host 1.1.1.1 any log 7 interval
600
Configures logging for an ACE.
The
access-list
access_list_name
syntax specifies the access list for which
you want to configure logging.
The
extended
option adds an ACE.
The
deny
keyword denies a packet if the conditions are matched. Some
features do not allow deny ACEs, such as NAT. (See the command
documentation for each feature that uses an access list for more
information.)
The
permit
keyword permits a packet if the conditions are matched.
If you enter the
log
option without any arguments, you enable syslog
message 106100 at the default level (6) and for the default interval (300
seconds). See the following options:
•
level
—A severity level between 0 and 7. The default is 6.
•
interval
secs
—The time interval in seconds between syslog messages,
from 1 to 600. The default is 300. This value is also used as the timeout
value for deleting an inactive flow.
•
disable
—Disables all access list logging.
•
default
—Enables logging to message 106023. This setting is the same
as having no
log
option.
(See the
access-list
command in the
Cisco Security Appliance Command
Reference
for more information about command options.)
Command
Purpose
show access list
Displays the access list entries by number.
show running-config access-list
Displays the current running access list
configuration.
Summary of Contents for 5505 - ASA Firewall Edition Bundle
Page 28: ...Glossary GL 24 Cisco ASA Series CLI Configuration Guide ...
Page 61: ...P A R T 1 Getting Started with the ASA ...
Page 62: ......
Page 219: ...P A R T 2 Configuring High Availability and Scalability ...
Page 220: ......
Page 403: ...P A R T 2 Configuring Interfaces ...
Page 404: ......
Page 499: ...P A R T 2 Configuring Basic Settings ...
Page 500: ......
Page 533: ...P A R T 2 Configuring Objects and Access Lists ...
Page 534: ......
Page 601: ...P A R T 2 Configuring IP Routing ...
Page 602: ......
Page 745: ...P A R T 2 Configuring Network Address Translation ...
Page 746: ......
Page 845: ...P A R T 2 Configuring AAA Servers and the Local Database ...
Page 846: ......
Page 981: ...P A R T 2 Configuring Access Control ...
Page 982: ......
Page 1061: ...P A R T 2 Configuring Service Policies Using the Modular Policy Framework ...
Page 1062: ......
Page 1093: ...P A R T 2 Configuring Application Inspection ...
Page 1094: ......
Page 1191: ...P A R T 2 Configuring Unified Communications ...
Page 1192: ......
Page 1333: ...P A R T 2 Configuring Connection Settings and QoS ...
Page 1334: ......
Page 1379: ...P A R T 2 Configuring Advanced Network Protection ...
Page 1380: ......
Page 1475: ...P A R T 2 Configuring Modules ...
Page 1476: ......
Page 1549: ...P A R T 2 Configuring VPN ...
Page 1550: ......
Page 1965: ...P A R T 2 Configuring Logging SNMP and Smart Call Home ...
Page 1966: ......
Page 2059: ...P A R T 2 System Administration ...
Page 2060: ......
Page 2098: ...1 8 Cisco ASA Series CLI Configuration Guide Chapter 1 Troubleshooting Viewing the Coredump ...
Page 2099: ...P A R T 2 Reference ...
Page 2100: ......