Cisco ASA Netflow Configuration

Modified on Fri, 9 Aug at 4:12 PM

The following steps detail how Cisco ASA and Pix firewall logs can be sent to the CCE. You have two options: Configure using the Command Line Interface or via the User Interface.


TABLE OF CONTENTS


Option 1: Configuring Cisco ASA using Command Line Interface

Telnet to the firewall and enter the enable mode


Type the following:

configure terminal

logging on

logging timestamp

logging trap informational

logging device-id {context-name | hostname | ipaddress interface_name | string text} 

logging host interface_name syslog_ip [17/]


where,


interface_ nameis the interface on the firewall whose logs need to be analyzed ("inside" or "outside," for example).
syslog_ipis the IP address of the syslog server (CCE host’s IP address) to which the ASA firewall should send the Syslogs.
17 / <syslog_port>indicates that logs will be sent using the UDP protocol, to the configured syslog port on the syslog server. If left blank, the syslogs are sent through the default syslog port (UDP port 514). If the logs are sent through any other port, mention it as 17/ (For example: 17/1514).
hostnamefirewall's host name (defined with the hostname configuration command). In this case, the hostname will appear in the logs sent from the Firewall.
ipaddress interface_ namethe IP address of a specific firewall interface named interface_name ("inside" or "outside," for example). In this case, the IP Address of the Interface Name will appear in the logs sent from the Firewall.
string textan arbitrary text string (up to 16 characters). In this case, the arbitrary text string you have entered in string will appear in the logs sent from the Firewall.
context-nameoperating in multiple-context mode, the name of the firewall context will appear in the logs sent from the Firewall.


Example: logging host inside 11.23.4.56 17/1514


To verify your configuration, enter the show logging command after the last command above. This will list the current logging configuration on the firewall.


Option 2: Configuring Cisco ASA from the User Interface

Log in to the Cisco user interface, and follow the steps below to configure the firewall:


  1. Enable Logging:
    1. Select Configure > Settings > Logging > Logging Setup.
    2. Select the Enable logging setup and Enable logging failover check boxes.
    3. Click Apply.
      Changes are applied to the assigned firewall configuration files when they are generated. The configuration files are then downloaded to firewalls at deployment.
  2. Configure Syslog Server:
    1. Select Configure > Settings > Logging > Syslog.
    2. Check Include Timestamp.
    3. Click Add to add a row.
    4. In the Add Syslog Server page that appears, enter the following:
      1. Interface Name - the firewall interface through which Firewall Analyzer can be reached, the interface can be either inside or outside.
      2. IP Address - the IP address of the syslog server (CCE host IP Address) to which logs have to be sent.
      3. Under Protocol, select the UDP radio button.
      4. The default UDP port is 514. If you have configured a different syslog listener port on your syslog server, enter the same port here.
    5. Click Apply.
  3. Configure Logging Level:
    1. Select Configure > Settings > Logging > Other.
    2. Under Console Level List, select Informational so that all report data is available.
    3. Click Apply.










Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article