Cisco ASA Logs
Updated Aug 31, 2023Configure Cisco ASA to send logs to Arctic Wolf
You can configure syslog forwarding for Cisco Adaptive Security Appliance® (ASA) software using one of these methods:
- Adaptive Security Device Manager (ASDM) — See Configure Cisco ASA firewall syslog forwarding using ASDM.
- Command line interface (CLI) — See Configure Cisco ASA firewall syslog forwarding using the CLI.
Note: After you configure these logs, changing the severity level of a log message may cause unexpected alerts. If you need to change a severity level, contact your Concierge Security® Team (CST) for assistance.
Requirements
- Activated Arctic Wolf Sensor
Configure Cisco ASA firewall syslog forwarding using ASDM
- In ASDM, select Configuration.
- In the Device Management pane, select Logging > Logging Setup to configure basic logging parameters for the Cisco ASA firewall.
- In the Logging Setup section, ensure that Enable logging is selected.
- If the firewall has a secondary failover device, select Enable logging on the failover device.
- In the navigation pane, under Logging, select Syslog Servers.
- Click Add to add the sensor as the destination for syslog.
- In the Add Syslog Server dialog box, enter the syslog server details:
- Interface — Select the interface that can communicate with the Arctic Wolf Sensor.
Tip: This interface is usually named
Inside
or similar. - IP Address — Enter the IP address of the Arctic Wolf Sensor management port.
- Protocol — Select UDP.
- Timestamp — Ensure that it is selected and choose either the Legacy or RFC5424 format.
Note: Legacy matches your system time, while RFC5424 uses UTC time.
- Interface — Select the interface that can communicate with the Arctic Wolf Sensor.
- Click OK to close the Add Syslog Server dialog box.
- In the navigation pane, under Logging, select Logging Filters, and then enter these details:
Tip: The Logging section shows each possible logging destination and the current level of logs that are sent to those destinations.
- In the Logging Destinations section, click Syslog Servers.
- Click Edit.
- Select Informational from the Filter on severity list.
- Click OK to close the Edit Logging Filters dialog box.
- Select Syslog Setup.
- In the Syslog format section, select Enable timestamp on Syslog messages.
- Click the Timestamp Format menu and select your timestamp format.
Note: Legacy matches your system time, while RFC5424 uses UTC.
- In the Logging Filters section, click Apply.
- Click Save to save the configuration. Any changes are applied on the next device reboot.
- Contact your Concierge Security® Team to inform them that you have configured syslog forwarding.
Configure Cisco ASA firewall syslog forwarding using the CLI
- Run the following command to configure the syslog parameters, where
<interface_name>
is the interface name and<ip_address>
is the Arctic Wolf Sensor IP address:logging enable logging timestamp logging trap informational logging host <interface_name> <ip_address> 17/514 timestamp legacy
Tip: If you do not know your interface name, the following command may display the interface name in some instances:
show route <ip_address>
Note:
timestamp legacy
matches your system time, whiletimestamp rfc5424
uses UTC. - Contact your Concierge Security® Team to inform them that you have configured syslog forwarding.