Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Cisco ASA 5520 - FW log analyzer

Posted on 2009-07-07
3
Medium Priority
?
1,804 Views
Last Modified: 2013-11-16
There are millians of lines of log report getting from FW on every hour. Is there any tool to analyze the log pattern and give us the details of each level ( info to emergency level ? )

Recommend to have Open source if not, commercial is okey?
0
Comment
Question by:Sriram_pp
3 Comments
 
LVL 23

Accepted Solution

by:
debuggerau earned 500 total points
ID: 24800840
the logs should contain those levels already, if you want them broken up and grouped, might be better to do that on the ASA as you can have multiple alert sets.

But as far as third party solutions:
http://syslog-archiving.qarchive.org/
0
 
LVL 34

Assisted Solution

by:Istvan Kalmar
Istvan Kalmar earned 500 total points
ID: 24801899
Hi,

I use AdventNet Manege Engine Firewall Analyzer, it has a grapical interface, very useful program!
It saves the logs into SQL database!

http://www.manageengine.com/products/firewall/download.html
0
 

Author Closing Comment

by:Sriram_pp
ID: 31600967
Both the tools are most useful
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
The DROP (Spamhaus Don't Route Or Peer List) is a small list of IP address ranges that have been stolen or hijacked from their rightful owners. The DROP list is not a DNS based list.  It is designed to be downloaded as a file, with primary intention…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…
Is your data getting by on basic protection measures? In today’s climate of debilitating malware and ransomware—like WannaCry—that may not be enough. You need to establish more than basics, like a recovery plan that protects both data and endpoints.…
Suggested Courses

963 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question