We help IT Professionals succeed at work.

We've partnered with Certified Experts, Carl Webster and Richard Faulkner, to bring you a podcast all about Citrix Workspace, moving to the cloud, and analytics & intelligence. Episode 2 coming soon!Listen Now


can't get syslog from PIX515e

nader911t asked
Medium Priority
Last Modified: 2012-08-13
I have been having problems seeing my network using remote-site VPN (still open question) I was advised to check the syslog of my PIX515e to see if a misconfiguration of ACL is causing this. i have followed the configurations steps for syslog of Cisco.com and i have on my local machine installed Syslog Watcher Pro. so far I can't receive any information from my PIX. my network is setup to have a DMZ behind the firewall, could that be it?
 I use ASDM for most of my configurations.
bellow are my PIX configurations:
PIX Version 7.2(2)
hostname Khalifa-Sec-Boys-FW
domain-name khalifasb.edu.qa
enable password * encrypted
interface Ethernet0
 nameif outside
 security-level 0
 ip address
interface Ethernet1
 nameif inside
 security-level 100
 ip address
interface Ethernet2
 no nameif
 no security-level
 no ip address
interface Ethernet3
 no nameif
 no security-level
 no ip address
interface Ethernet4
 no nameif
 no security-level
 no ip address
interface Ethernet5
 no nameif
 no security-level
 no ip address
passwd * encrypted
ftp mode passive
dns server-group DefaultDNS
 domain-name khalifasb.edu.qa
access-list inside extended permit ip any any
access-list inside extended permit icmp any any
access-list OUTSIDE extended permit tcp any host eq smtp
access-list OUTSIDE extended permit tcp any host eq https
access-list OUTSIDE extended permit tcp any host eq www
access-list users_splitTunnelAcl standard permit any
access-list inside_nat0_outbound extended permit ip any 255.255.255
access-list UsersVPN standard permit
access-list UsersVPN standard permit
access-list UsersVPN standard permit
access-list UsersVPN standard permit
access-list UsersVPN standard permit
pager lines 24
logging enable
logging timestamp
logging asdm-buffer-size 512
logging buffered debugging
logging asdm debugging
logging from-address pixsyslog@khalifa-s-b.edu.qa
logging recipient-address nader_subaih@khalifa-s-b.edu.qa level notifications
logging host inside 6/1470
mtu outside 1500
mtu inside 1500
ip local pool VPN-Pool mask
no failover
icmp unreachable rate-limit 1 burst-size 1
asdm image flash:/asdm
no asdm history enable
arp timeout 14400
global (outside) 1 interface
nat (inside) 0 access-list inside_nat0_outbound
nat (inside) 1
nat (inside) 1
nat (inside) 1
nat (inside) 1
nat (inside) 1
static (inside,outside) tcp https https netmask 255.25
static (inside,outside) tcp smtp smtp netmask 255.255.
static (inside,outside) tcp www www netmask 255.255.25
access-group OUTSIDE in interface outside
route outside 1
route inside 1
route inside 1
route inside 1
route inside 1
route inside 1
route inside 1
timeout xlate 3:00:00
timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02
timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
timeout uauth 0:05:00 absolute
group-policy users internal
group-policy users attributes
 dns-server value
 vpn-tunnel-protocol IPSec
 split-tunnel-policy tunnelspecified
 split-tunnel-network-list value users_splitTunnelAcl
 default-domain value khalifasb.edu.qa
username nader password CEdJXQTRpBUkygd5 encrypted privilege 0
username nader attributes
 vpn-group-policy users
http server enable
http inside
http inside
no snmp-server location
no snmp-server contact
snmp-server enable traps snmp authentication linkup linkdown coldstart
crypto ipsec transform-set ESP-AES-256-SHA esp-aes-256 esp-sha-hmac
crypto dynamic-map outside_dyn_map 20 set pfs
crypto dynamic-map outside_dyn_map 20 set transform-set ESP-AES-256-SHA
crypto map outside_map 65535 ipsec-isakmp dynamic outside_dyn_map
crypto map outside_map interface outside
crypto isakmp enable outside
crypto isakmp policy 10
 authentication pre-share
 encryption 3des
 hash sha
 group 2
 lifetime 86400
tunnel-group users type ipsec-ra
tunnel-group users general-attributes
 address-pool VPN-Pool
 default-group-policy users
tunnel-group users ipsec-attributes
 pre-shared-key *
telnet inside
telnet inside
telnet timeout 5
ssh timeout 5
console timeout 0
class-map inspection_default
 match default-inspection-traffic
policy-map type inspect dns preset_dns_map
  message-length maximum 512
policy-map global_policy
 class inspection_default
  inspect dns preset_dns_map
  inspect http
  inspect icmp
  inspect netbios
  inspect ftp
  inspect tftp
  inspect skinny
  inspect h323 h225
  inspect h323 ras
  inspect rsh
  inspect rtsp
  inspect sqlnet
  inspect sunrpc
  inspect sip
  inspect xdmcp
policy-map global_poliocy
service-policy global_policy global
prompt hostname context
: end
Watch Question

Top Expert 2007
Hello nader911t,
      Most probably, a software firewall like Windows Firewall is blocking syslog port UDP 514. Yet you dont need a syslog server since ASDM has one built-in.


Not the solution you were looking for? Getting a personalized solution is easy.

Ask the Experts
Top Expert 2009
Add this:

logging trap informational

Also, verify the syslog server is listening on 1470
Access more of Experts Exchange with a free account
Thanks for using Experts Exchange.

Create a free account to continue.

Limited access with a free account allows you to:

  • View three pieces of content (articles, solutions, posts, and videos)
  • Ask the experts questions (counted toward content limit)
  • Customize your dashboard and profile

*This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.


Please enter a first name

Please enter a last name

8+ characters (letters, numbers, and a symbol)

By clicking, you agree to the Terms of Use and Privacy Policy.