Send ASA Syslog Events to the Cisco Cloud Using CLI
Procedure
Step 1 | Configure the ASA to send messages to the SEC as if it were a syslog server When sending syslog events from the ASA to the Cisco cloud, you forward them to the SEC as if it were an external syslog server, and it forwards the messages to the Cisco cloud. To send syslog messages to the SEC, perform the following steps:
| ||
Step 2 | Specify which syslog messages should be sent to the syslog server with the following command:
logging trap
{
severity_level
|
message_list
}
Examples:
You can specify the severity level number (1 through 7) or name. For example, if you set the severity level to 3, then the ASA sends syslog messages for severity levels 3, 2, and 1. The message_list argument is replaced with the name of a custom event list, if you have created one. When specifying a custom event list, you only send the syslog messages that are in that list to the Secure Event Connector. In the example above, asa_syslogs_to_cloud is the name of the event list. Using a message_list could save you money by tightly defining which syslog messages are sent to the Cisco cloud. See Create a Custom Event List to create a message_list. See Security Analytics and Logging Event Storage for more information about data ingest and storage costs. | ||
Step 3 | (Optional) Add the syslog timestamp Add the date and time that the syslog message originated on the ASA to the message using the logging timestamp command. The timestamp value is displayed in the SyslogTimestamp field. Example:
| ||
Step 4 | (Optional) Include a device ID in non-EMBLEM format syslog messages A device ID is an identifier you can insert in a syslog message that will help you easily distinguish all syslog messages sent from a particular ASA. See Include the Device ID in Non-EMBLEM Format Syslog Messages for instructions. | ||
Step 5 | (Optional) Enable logging on access control rule "permit" events When an access control rule denies access to a resource, the event is automatically logged. If you also want to log events generated when an access control rule allows access to a resource, you need to turn on logging for the access control rule and configure a severity type. See Log Rule Activity for instructions on how to turn on logging for an individual network access control rule.
| ||
Step 6 | Enable logging At the command prompt, type logging enable. On the ASA, logging is enabled for the entire device, not for individual rules. Example:
| ||
Step 7 | Save your Changes to the Startup Config At the command prompt, type write memory. On the ASA, logging is enabled for the entire device, not for individual rules. Example:
|