Solved

Capturing Web Traffic on a CISCO ASA 5520

Posted on 2010-11-18
4
689 Views
Last Modified: 2012-08-13
good day everyone,

we have a cisco ASA 5520 which has syslog capabilites but i do not see where i can monitor websites our users are hitting, is there any way to get this done via the ASDM or with a third-party application that works with the ASA device or is inexpensive or open source? thank you all.

GL137
0
Comment
Question by:GridLock137
  • 2
  • 2
4 Comments
 
LVL 33

Expert Comment

by:MikeKane
ID: 34165478
If you turn on http inspection, the normal syslog will capture the URL requests.    

Example:
Sample URL Log
The following is an example of a URL logging syslog message:
192.168.69.71 accessed URL 10.0.0.1/secrets.gif

You can change the class inspection to include http if needed.   Just follow this doc to do so:
http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_tech_note09186a008085283d.shtml
0
 
LVL 7

Author Comment

by:GridLock137
ID: 34166194
where is the ASA device manager can i do this?
0
 
LVL 33

Accepted Solution

by:
MikeKane earned 500 total points
ID: 34166685
Its in CONFIGURATION -> FIREWALL -> SERVICE POLICY RULES  

Here's a doc that explains how to do it.  ( I wasn't sure about your version, buts its pretty much the same)
http://www.cisco.com/en/US/docs/security/asdm/6_1/user/guide/inspctrl.html#wp1142285
0
 
LVL 7

Author Closing Comment

by:GridLock137
ID: 34167330
thank you.
0

Featured Post

Migrating Your Company's PCs

To keep pace with competitors, businesses must keep employees productive, and that means providing them with the latest technology. This document provides the tips and tricks you need to help you migrate an outdated PC fleet to new desktops, laptops, and tablets.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
CISCO ATA 190 using PRI DID number 6 40
Cisco AP to get ip from DHCP 10 73
Block YouTube via Application Control in Fortigate 1000C 3 29
Cisco ASA 3 25
Cybersecurity has become the buzzword of recent years and years to come. The inventions of cloud infrastructure and the Internet of Things has made us question our online safety. Let us explore how cloud- enabled cybersecurity can help us with our b…
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question