Cisco ASA Firewall - Syslog - ASA 9.1 (Cisco Pocket Lab Guides Book 4)
Book Details
Author(s)Grant Wilson
PublisherPickenfield Publishing
ISBN / ASINB00IAPMMU8
ISBN-13978B00IAPMMU2
MarketplaceIndia 🇮🇳
Description
In this lab guide I will be discussing how to utilise the logging functionality on a Cisco ASA firewall using the CLI and the ASDM. I will not go through every feature that is possible on the ASA regarding logging, but instead look at the most used features.
Lab requirements:
-Send syslogs to host 192.168.3.98 at the “Informational†level.
-Buffer syslogs at the “informational†level. The buffer size will be 16384 bytes.
-Diagnose issues by sending certain logs to an SSH session.
-Have an accurate timestamp on each syslog.
-Send really important syslogs to a mail server at 192.168.3.98.
-Log “hits†to ACL statements.
-Enable all syslog messages to have the name of the ASA to be included inside the message.
-Do not log message “113019â€.
-Change the severity level of message “315011†to alert.
The ASA will be based upon a 5505 with version 9.1 but a lot of the configuration will work on previous versions of the code and on other ASA platforms.
Lab requirements:
-Send syslogs to host 192.168.3.98 at the “Informational†level.
-Buffer syslogs at the “informational†level. The buffer size will be 16384 bytes.
-Diagnose issues by sending certain logs to an SSH session.
-Have an accurate timestamp on each syslog.
-Send really important syslogs to a mail server at 192.168.3.98.
-Log “hits†to ACL statements.
-Enable all syslog messages to have the name of the ASA to be included inside the message.
-Do not log message “113019â€.
-Change the severity level of message “315011†to alert.
The ASA will be based upon a 5505 with version 9.1 but a lot of the configuration will work on previous versions of the code and on other ASA platforms.









