Logmanager documentation
Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Cisco ASA

Cisco ASA provides a variety of useful logging information. To set the correct logging you can choose the method that works best for you. You can choose either the GUI using Adaptive Security Device Manager (ASDM) or CLI using SSH.

Configuring Cisco ASA via ASDM

This procedure demonstrates the ASDM configuration for all available syslog destinations.

  1. In order to enable logging on the ASA, first configure the basic logging parameters. Choose Configuration ‣ Features ‣ Properties ‣ Logging ‣ Logging Setup.Check the Enable logging check box in order to enable syslog.

    Enable logging

    Enable logging

  2. In order to configure the Logmanager server as the destination for syslog, choose Syslog Servers in Logging and click Add in order to add the Logmanager server. Enter the Logmanager server details in the Add Syslog Server box:

    • select interface
    • set Logmanager_ip_address
    • set protocol to UDP
    • port 514
    • enable Log messages in Cisco EMBLEM format (UDP only) and choose OK when you are done.
      Logging to the Logmanager

      Logging to the Logmanager

  3. In order to enable logs to be sent to any of the prior mentioned destinations, choose Logging Filters in the logging section. This presents you with each possible logging destination and the current level of logs that are sent to those destinations. Choose the desired Logging Destination and click Edit.

    Configure syslog filters

    Configure syslog filters

  4. Choose an appropriate severity, in this case Debugging, from the Filter on severity drop-down list. Click OK when you are done.

    Edit logging filters

    Edit logging filters

  5. Click Apply after you return to the Logging Filters window.

Configuring Cisco ASA via SSH

Login to your Cisco ASA device using SSH and use the following commands to configure the format of syslog messages correctly.

  1. Login to Cisco ASA device

  2. Before any messages are sent to the log buffer, you must enable logging using the logging enable command:

    logging enable
    
  3. To specify that syslog messages should include the date and time when the messages was generated, use command:

    logging timestamp
    
  4. To specify the size of the log buffer, use command buffer-size. Set buffer size to 64kB:

    logging buffer-size 65535
    
  5. To enable the adaptive security appliance to display syslog messages in console sessions, use command console with emergencies level:

    logging console emergencies
    
  6. Enable logging to the log buffer:

    logging buffered informational
    
  7. To specify which syslog messages the adaptive security appliance sends to the Logmanager server, use command:

    logging trap debugging
    
  8. To enable SNMP logging and specify which messages are to be sent to SNMP servers, use command:

    logging history alerts
    
  9. Enable logging to ASDM:

    logging asdm informational
    
  10. To specify the logging facility used for messages sent to the Logmanager server, use facility command with number facility 16:

    logging facility 16
    
  11. To specify how many syslog messages the adaptive security appliance may hold in its queue before processing them according to the logging configuration, use command:

    logging queue 4096
    
  12. To define the Logmanager server, use the logging host command:

        logging host <interface_name> <Logmanager_IP_address> format emblem
    
    interface_name specifies the interface on which the Logmanager server resides.
    Logmanager_IP_address is IP address of your Logmanager server.
  13. To specify the logging level of a syslog message, use the logging message command with the level keyword:

    logging message 302014 level warnings
    
  14. To allow management access to an interface other than the one from which you entered the adaptive security appliance when using VPN, use the management-access command:

    management-access <mgmt_if>
    
    mgmt_if specifies the name of the management interface you want to access when entering the adaptive security appliance from another interface.
  15. Enable logging for ACL rule that you need to log:

    access-list <ACL_rule> extended permit ip any any log debugging
    
    ACL_rule: for example: INSIDE_OUT or inside_access_in…
  16. Defines object groups that you can use to optimize your configuration:

    access-group <ACL_rule> in interface <interface_name>
    

    ACL_rule: for example: INSIDE_OUT or inside_access_in…
    interface_name specifies the interface on which the Logmanager server resides

Alternative Cisco ASA logging via TLS syslog

To enable secure logging on the ASA you first need to install the syslog servers ca certificate. One easy way of doing this is through ASDM. To begin, login to ASDM and navigate to Device Management, Certificate Management and then click on CA Certificates and press Add.

Name the certificate something descriptive such as “Syslog” and then choose “Paste Certificate in PEM format” and paste the contents of your servers PEM certificate into the box and choose “Install Certificate”.

Install Certificate

Install Certificate

Next, navigate to Logging, Syslog Servers and choose “Add.” In the pop-up box designate your inside interface (if that is where your logging server resides), supply the IP address of the server, choose “TCP,” change the port and check the “Enable Secure Syslog Logging” pressing “Ok” when done.

After pressing “Ok” make sure to check the box “Allow user traffic to pass when TCP syslog server is down”.

You can now enable syslog logging by going to Logging Filters, double clicking on Syslog Servers and choose a severity to filter on.

Add Syslog Server

Add Syslog Server