Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Logging configuration changes Cisco asa 5510

Posted on 2014-03-03
4
Medium Priority
?
2,455 Views
Last Modified: 2014-03-04
I need to setup a Cisco asa 5510 to log the changes made to the firewall and I need t know how to access this log. I am sending logging to a syslog server but i do not see this information in the syslogs.
0
Comment
Question by:jimmylew52
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 25

Assisted Solution

by:Ken Boone
Ken Boone earned 1000 total points
ID: 39901033
So this product will do what you want:

http://www.cisco.com/c/en/us/products/security/secure-access-control-system/index.html

It used to be on an appliance but most folks run it on a VM now.

It does the authentication to all of your cisco devices centrally, then it logs what commands each user is doing.  You get a complete record of all command line transactions that occur on your cisco equipment.

You won't see the specific configuration changes in the syslog.
0
 
LVL 17

Accepted Solution

by:
TimotiSt earned 1000 total points
ID: 39901060
0
 
LVL 26

Expert Comment

by:pony10us
ID: 39901063
You can also use Kiwi Cattools from Solarwinds.

http://www.kiwisyslog.com/products/kiwi-cattools/product-overview.aspx
0
 
LVL 1

Author Comment

by:jimmylew52
ID: 39901657
I will give this a try
0

Featured Post

Will your db performance match your db growth?

In Percona’s white paper “Performance at Scale: Keeping Your Database on Its Toes,” we take a high-level approach to what you need to think about when planning for database scalability.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

#Citrix #Netscaler #MSSQL #Load Balance
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses

722 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question