EasyManuals Logo

Cisco 5510 - ASA SSL / IPsec VPN Edition Configuration Guide

Cisco 5510 - ASA SSL / IPsec VPN Edition
1822 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #1639 background imageLoading...
Page #1639 background image
72-5
Cisco ASA 5500 Series Configuration Guide using ASDM
OL-20339-01
Chapter 72 Configuring NetFlow Secure Event Logging (NSEL)
Using NetFlow
Step 6 When NetFlow is enabled, certain syslog messages become redundant. To maintain system performance,
we recommend that you disable all redundant syslog messages, because the same information is exported
through NetFlow. To disable all redundant syslog messages, check the Disable redundant syslog
messages check box. To display the redundant syslog messages and their status, click Show Redundant
Syslog Messages.
The Redundant Syslog Messages dialog box appears. The Syslog ID field displays the redundant syslog
message numbers. The Disabled field indicates whether or not the specified syslog message is disabled.
Click OK to close this dialog box.
To disable individual redundant syslog messages, choose Configuration > Device Management >
Logging > Syslog Setup.
Step 7 Click Apply to save your changes. Click Reset to enter new settings.
What to Do Next
See the “Matching NetFlow Events to Configured Collectors” section on page 72-5.
Matching NetFlow Events to Configured Collectors
After you configure NetFlow collectors, you can match a NetFlow event with any of these configured
collectors.
To specify which NetFlow events should be sent to which collector, perform the following steps:
Step 1 In the ASDM main application window, choose Configuration > Firewall > Service Policy Rules.
Step 2 To add a service policy rule, perform the following steps:
a. Click Add to display the Add Service Policy Rule Wizard. For more information about service
policy rules, see the Adding a Service Policy Rule for Through Traffic” section on page 29-8.
b. Click the Global - applies to all interfaces radio button to apply the rule to the global policy. Click
Next.
c. Check the Source and Destination IP Address (uses ACL) check box or the Any traffic check box
as traffic match criteria, or click the Use class-default as traffic class radio button. Click Next to
continue to the Rule Actions screen.
Note NetFlow actions are available only for global service policy rules and are applicable only to the
class-default traffic class and to traffic classes with traffic match criteria of “Source and
Destination IP Address (uses ACL)” or “Any traffic.
Step 3 In the Rule Actions screen, click the NetFlow tab.
Step 4 To specify flow events, click Add to display the Add Flow Event dialog box, and then perform the
following steps:
a. Choose the flow event type from the drop-down list. Available events are created, torn down, denied,
or all.
b. Choose collectors to which you want events sent by checking the corresponding check boxes in the
Send column.

Table of Contents

Other manuals for Cisco 5510 - ASA SSL / IPsec VPN Edition

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 5510 - ASA SSL / IPsec VPN Edition and is the answer not in the manual?

Cisco 5510 - ASA SSL / IPsec VPN Edition Specifications

General IconGeneral
BrandCisco
Model5510 - ASA SSL / IPsec VPN Edition
CategoryFirewall
LanguageEnglish

Related product manuals