can't get syslog from PIX515e

I have been having problems seeing my network using remote-site VPN (still open question) I was advised to check the syslog of my PIX515e to see if a misconfiguration of ACL is causing this. i have followed the configurations steps for syslog of and i have on my local machine installed Syslog Watcher Pro. so far I can't receive any information from my PIX. my network is setup to have a DMZ behind the firewall, could that be it?
 I use ASDM for most of my configurations.
bellow are my PIX configurations:
PIX Version 7.2(2)
hostname Khalifa-Sec-Boys-FW
enable password * encrypted
interface Ethernet0
 nameif outside
 security-level 0
 ip address
interface Ethernet1
 nameif inside
 security-level 100
 ip address
interface Ethernet2
 no nameif
 no security-level
 no ip address
interface Ethernet3
 no nameif
 no security-level
 no ip address
interface Ethernet4
 no nameif
 no security-level
 no ip address
interface Ethernet5
 no nameif
 no security-level
 no ip address
passwd * encrypted
ftp mode passive
dns server-group DefaultDNS
access-list inside extended permit ip any any
access-list inside extended permit icmp any any
access-list OUTSIDE extended permit tcp any host eq smtp
access-list OUTSIDE extended permit tcp any host eq https
access-list OUTSIDE extended permit tcp any host eq www
access-list users_splitTunnelAcl standard permit any
access-list inside_nat0_outbound extended permit ip any 255.255.255
access-list UsersVPN standard permit
access-list UsersVPN standard permit
access-list UsersVPN standard permit
access-list UsersVPN standard permit
access-list UsersVPN standard permit
pager lines 24
logging enable
logging timestamp
logging asdm-buffer-size 512
logging buffered debugging
logging asdm debugging
logging from-address
logging recipient-address level notifications
logging host inside 6/1470
mtu outside 1500
mtu inside 1500
ip local pool VPN-Pool mask
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image flash:/asdm
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1
nat (inside) 1
nat (inside) 1
nat (inside) 1
nat (inside) 1
static (inside,outside) tcp https https netmask 255.25
static (inside,outside) tcp smtp smtp netmask 255.255.
static (inside,outside) tcp www www netmask 255.255.25
access-group OUTSIDE in interface outside
route outside 1
route inside 1
route inside 1
route inside 1
route inside 1
route inside 1
route inside 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
group-policy users internal
group-policy users attributes
 dns-server value
 vpn-tunnel-protocol IPSec
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value users_splitTunnelAcl
 default-domain value
username nader password CEdJXQTRpBUkygd5 encrypted privilege 0
username nader attributes
 vpn-group-policy users
http server enable
http inside
http inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto dynamic-map outside_dyn_map 20 set pfs
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-AES-256-SHA
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
tunnel-group users type ipsec-ra
tunnel-group users general-attributes
 address-pool VPN-Pool
 default-group-policy users
tunnel-group users ipsec-attributes
 pre-shared-key *
telnet inside
telnet inside
telnet timeout 5
ssh timeout 5
console timeout 0
class-map inspection_default
 match default-inspection-traffic
policy-map type inspect dns preset_dns_map
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect http
  inspect icmp
  inspect netbios
  inspect ftp
  inspect tftp
  inspect skinny
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect sqlnet
  inspect sunrpc
  inspect sip
  inspect xdmcp
policy-map global_poliocy
service-policy global_policy global
prompt hostname context
: end
Who is Participating?
Alan Huseyin KayahanCommented:
Hello nader911t,
      Most probably, a software firewall like Windows Firewall is blocking syslog port UDP 514. Yet you dont need a syslog server since ASDM has one built-in.

Kamran ArshadIT AssociateCommented:
Add this:

logging trap informational

Also, verify the syslog server is listening on 1470
Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

All Courses

From novice to tech pro — start learning today.