Solved

how to monitor incoming traffic through a certain port cisco pix 506e

Posted on 2006-11-03
7
517 Views
Last Modified: 2013-11-16
is there a way to monitor what ports ppl from the outside world are trying to access from the cisco pix 506e?

michael
0
Comment
Question by:myfootsmells
  • 3
  • 2
7 Comments
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
All of them. Somebody, somewhere is always scanning your outside interface trying every port.
If you want to be flooded with information, just start logging everything that gets denied by turning on ip audit.
 ip audit attack action alarm  <== send syslog message
 ip audit info action alarm
 ip audit interface outside

sho ip audit interface outside
0
 
LVL 5

Author Comment

by:myfootsmells
Comment Utility
mmm -- i already have my syslog server setup, do i need to tell the pix which syslog server to use with the above commands or will it just take the current ones?

what does sho do?
0
 
LVL 32

Expert Comment

by:rsivanandan
Comment Utility
logging on
logging host

Use these commands and give the ip address in the second command to enable logging onto a syslog client. Get Kiwi Syslog (free) if you don't have one.

Cheers,
Rajesh
0
Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
sho = shortcut for show
0
 
LVL 5

Author Comment

by:myfootsmells
Comment Utility
the ip audit interface outside is an invalid command.  i tried ip audit interface outbound which is the name of my interface still no good.
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 125 total points
Comment Utility
http://www.cisco.com/univercd/cc/td/doc/product/iaabu/pix/pix_sw/v_63/cmdref/gl.htm#wp1101884

ip audit interface if_name audit_name

ip audit interface outside info
0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

How to configure Site to Site VPN on a Cisco ASA.     (version: 1.1 - updated August 6, 2009) Index          [Preface]   1.    [Introduction]   2.    [The situation]   3.    [Getting started]   4.    [Interesting traffic]   5.    [NAT0]   6.…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now