The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
This document describes the logging configuration for a FirePOWER Threat Defense (FTD) via Firepower Management Center (FMC).
Cisco recommends that you have knowledge of these topics:
The information in this document is based on these software and hardware versions:
The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, ensure that you understand the potential impact of any command.
The FTD system logs provide you with the information to monitor and troubleshoot the FTD appliance.
The logs are useful both in routine troubleshooting and in incident handling. The FTD appliance supports both local and external logging.
Local logging can help you troubleshoot the live issues. External logging is a method of collection of logs from the FTD appliance to an external Syslog server.
Logging to a central server helps in aggregation of logs and alerts. External logging can help in log correlation and incident handling.
For local logging, the FTD appliance supports console, internal buffer option, and the Secure Shell (SSH) session logging.
For external logging, the FTD appliance supports the external Syslog server and the Email Relay server.
Note: If a high volume of traffic passes through the appliance, pay attention to the type of logging/severity/rate limiting. Do this in order to limit the number of logs, which avoids impact on the firewall.
All logging related configurations can be configured when you navigate to the Platform Settings
tab under the Devices
tab. Choose Devices > Platform Settings
as shown in this image.
Either click the pencil icon in order to edit the policy that exists or click New Policy
, and then choose Threat Defense Settings
in order to create a new FTD policy as shown in this image.
Choose the FTD appliance to apply this policy and click Save
as shown in this image.
There are certain configurations which are applicable for both Local and External logging. This section deals with the mandatory and optional parameters which can be configured for Syslog.
Logging setup options are applicable for Local and External logging. In order to configure the Logging setup, choose Devices > Platform Settings
.
Choose Syslog > Logging Setup
.
Basic Logging Setup
Enable Logging
: Check the Enable Logging
check box in order to enable logging. This is a mandatory option.Enable Logging on the failover standby unit
: Check the Enable Logging on the failover standby unit
check box in order to configure logging on the standby FTD which is a part of an FTD High availability cluster.Send syslogs in EMBLEM format
: Check the Send syslogs in EMBLEM format
check box in order to enable the format of Syslog as EMBLEM for every destination. The EMBLEM format is used primarily for the CiscoWorks Resource Manager Essentials (RME) Syslog analyzer. This format matches the Cisco IOS Software Syslog format produced by the routers and the switches. It is available only to UDP Syslog servers.Send debug messages as syslogs
: Check the Send debug messages as syslogs
check box in order to send the debug logs as Syslog messages to the Syslog server.Memory size of the Internal Buffer
: Enter the internal memory buffer size where FTD can save the log data. The log data is rotated if its buffer limit is reached.FTP Server Information (Optional)
Specify FTP server details if you want to send the log data to FTP server before it overwrites the internal buffer.
FTP Server Buffer Wrap
: Check the FTP Server Buffer Wrap
check box in order to send the buffer log data to the FTP server.IP Address
: Enter the IP address of the FTP server.Username
: Enter the username of the FTP server.Path
: Enter the directory path of the FTP server.Password
: Enter the password of the FTP server.Confirm
: Enter the same password again.Flash Size (Optional)
Specify the flash size if you want to save the log data to flash once the internal buffer is full.
Flash
: Check the Flash
check box in order to send the log data to the internal flash.Maximum Flash to be used by Logging(KB)
: Enter the maximum size in KB of flash memory that can be used for logging.Minimum free Space to be preserved(KB)
: Enter the minimum size in KB of the flash memory which needs to be preserved.Click Save
in order to save the platform setting. Choose the Deploy
option, choose the FTD appliance where you want to apply the changes, and click Deploy
in order to start deployment of the platform setting.
The Configure Event Lists option allows you to create/edit an event list and specify which log data to include in the event list filter. Event Lists can be used when you configure Logging Filters under Logging destinations.
The system allows two options to use the functionality of custom event lists.
In order to configure custom event lists, choose Device > Platform Setting > Threat Defense Policy > Syslog > Event List
and click Add
. These are the options:
Name
: Enter the name of the event list.Severity/Event Class
: In the Severity/Event Class section, click Add
.Event Class
: Choose the event class from the drop-down list for the type of log data that you want. An Event Class defines a set of Syslog rules that represent the same features.For example, there is an Event Class for the session which includes all the Syslogs that relate to the session.
Syslog Severity
: Choose the severity from the drop-down list for the chosen Event Class. The severity can range from 0 (emergency) to 7 (debugging).Message ID
: If you are interested in specific log data related to a message ID, click Add
in order to put a filter based upon the message ID.Message IDs
: Specify the message ID as individual/ range format.Click OK
in order to save the configuration.
Click Save
in order to save the platform setting. Choose to Deploy
, choose the FTD appliance where you want to apply the changes, and click Deploy
in order to start deployment of the platform setting.
The Rate limit option defines the number of messages which can be sent to all configured destinations and defines the severity of the message to which you want to assign rate limits.
In order to configure custom event lists, choose Device > Platform Setting > Threat Defense Policy > Syslog > Rate Limit
. You have two options based on which you can specify the rate limit:
In order to enable the logging level-based rate limit, choose Logging Level
and click Add
.
Logging Level
: From the Logging Level
drop-down list, choose the logging level for which you want to perform the rate-limiting.Number of Messages
: Enter the maximum number of Syslog messages to be received within the specified interval.Interval(Second)
: Based on the parameter Number of Messages configured previously, enter the time interval in which a fixed set of Syslog messages can be received.The rate of Syslog is the Number of Messages/intervals.
Click OK
in order to save the logging level configuration.
In order to enable the logging level based rate limit, choose Logging Level
and click Add
.
Syslog ID
: Syslog IDs are used to uniquely identify the Syslog messages. From the Syslog ID
drop-down list, choose the Syslog ID.Number of Messages
: Enter the maximum number of syslog messages to be received within the specified interval.Interval(Second)
: Based on the parameter Number of Messages configured previously, enter the time interval in which a fixed set of Syslog messages can be received.The rate of Syslog is the Number of Messages/Interval.
Click OK
in order to save the Syslog level configuration.
Click Save
in order to save the platform setting. Choose to Deploy
, choose the FTD appliance where you want to apply the changes, and click Deploy
in order to start deployment of the platform setting.
Syslog settings allow configuration of the Facility values to be included in the Syslog messages. You can also include the timestamp in log messages and other Syslog server-specific parameters.
In order to configure custom event lists, choose Device > Platform Setting > Threat Defense Policy > Syslog > Syslog Settings
.
Facility
: A facility code is used to specify the type of program that is logging the message. Messages with different facilities can be handled differently. From the Facility
drop-down list, choose the facility value.Enable Timestamp on each Syslog Message
: Check the Enable Timestamp on each Syslog Message
check box in order to include the time stamp in Syslog messages.Enable Syslog Device ID
: Check the Enable Syslog Device ID
check box in order to include a device ID in non-EMBLEM-format Syslog messages.Netflow Equivalent Syslogs
: Check the Netflow Equivalent Syslogs
check box in order to send NetFlow equivalent Syslogs. It can affect the performance of the appliance.Add
and specify the Syslog ID/ Logging Level
check box.Click Save
in order to save the platform setting. Choose to Deploy
, choose the FTD appliance where you want to apply the changes, and click Deploy
in order to start deployment of the platform setting.
The Logging Destination section can be used in order to configure logging to specific destinations.
The available internal logging destinations are:
There are three steps to configure Local Logging.
Step 1. Choose Device > Platform Setting > Threat Defense Policy > Syslog > Logging Destinations
.
Step 2. Click Add
in order to add a Logging Filter for a specific logging destination
.
Logging Destination: Choose the required logging destination from the Logging Destination
drop-down list as Internal Buffer, Console, or SSH sessions.
Event Class: From the Event Class
drop-down list, choose an Event class. As described previously, Event Classes are a set of Syslogs that represent the same features. Event classes can be selected in these ways:
Filter on Severity
: Event Classes filter based on the severity of the Syslogs.User Event List
: Administrators can create specific Event Lists (previously described) with their own custom event classes and reference them in this section.Disable Logging
: Use this option in order to disable logging for the chosen Logging Destination and Logging Level.Logging Level: Choose the logging level from the drop-down list. The logging level range is from 0 (Emergencies) to 7 (debugging).
Step 3. In order to add a separate Event class to this Logging filter, click Add
.
Event Class
: Choose the Event Class from the Event Class
drop-down list.
Syslog Severity
: Choose the Syslog severity from the Syslog Severity
drop-down list.
Click OK
once the Filter is configured to add the Filter for a specific logging destination.
Click Save
in order to save the platform setting. Choose Deploy
, choose the FTD appliance where you want to apply the changes, and click Deploy
in order to start deployment the platform setting.
In order to configure external logging, choose Device > Platform Setting > Threat Defense Policy > Syslog > Logging Destinations
.
FTD supports these types of external logging.
The configuration for the external logging and the internal logging are the same. The selection of Logging destinations decides the type of logging that is implemented. It is possible to configure Event Classes based on Custom Event lists to the remote server.
Syslog servers can be configured to analyze and store logs remotely from the FTD.
There are three steps to configure remote Syslog servers.
Step 1. Choose Device > Platform Setting > Threat Defense Policy > Syslog > Syslog Servers
.
Step 2. Configure the Syslog server related parameter.
Allow user traffic to pass when TCP syslog server is down
check box in order to allow traffic to pass through the interface when the Syslog server is down.Step 3. In order to add remote Syslog servers, click Add
.
IP Address
: From the IP Address
drop-down list, choose a network object which has the Syslog servers listed. If you have not created a network object, click the plus (+) icon in order to create a new object.
Protocol
: Click either the TCP
or UDP
radio button for Syslog communication.
Port
: Enter the Syslog server port number. By default, it is 514.
Log Messages in Cisco EMBLEM format(UDP only)
: Click the Log Messages in Cisco EMBLEM format (UDP only)
check box in order to enable this option if it is required to log messages in the Cisco EMBLEM format. This is applicable for UDP-based Syslog only.
Available Zones
: Enter the security zones over which the Syslog server is reachable and move it to the Selected Zones/ Interfaces Column.
Click OK
and Save
in order to save the configuration.
Click Save
in order to save the platform setting. Choose Deploy
, choose the FTD appliance where you want to apply the changes, and click Deploy
in order to start deployment of the platform setting.
FTD allows you to send the Syslog to a specific email address. Email can be used as a logging destination only if an email relay server has already been configured.
There are two steps to configure email settings for the Syslogs.
Step 1. Choose Device > Platform Setting > Threat Defense Policy > Syslog >Email Setup
.
Source E-MAIL Address
: Enter the source email address which appears on all the emails sent out from the FTD which contain the Syslogs.
Step 2. In order to configure the destination email address and Syslog severity, click Add
.
Destination Email Address
: Enter the destination email address where the Syslog messages are sent.
Syslog Severity
: Choose the Syslog severity from the Syslog Severity
drop-down list.
Click OK
in order to save the configuration.
Click Save
in order to save the platform setting. Choose Deploy
, choose the FTD appliance where you want to apply the changes, and click Deploy
in order to start deployment of the platform setting.
There is currently no verification procedure available for this configuration.
This section provides information you can use in order to troubleshoot your configuration.
system support diagnostic-cli
command in order to console into the diagnostic CLI.
> system support diagnostic-cli Attaching to ASA console ... Press 'Ctrl+a then d' to detach. Type help or '?' for a list of available commands. ><Press Enter> firepower# sh run logging logging enable logging console emergencies logging buffered debugging logging host inside 192.168.0.192 logging flash-minimum-free 1024 logging flash-maximum-allocation 3076 logging permit-hostdown
ping
command.
Copyright 2004-2016, Cisco and/or its affiliates. All rights reserved. Cisco is a registered trademark of Cisco Systems, Inc. All other trademarks are property of their respective owners. Cisco Fire Linux OS v6.0.1 (build 37) Cisco Firepower Threat Defense for VMWare v6.0.1 (build 1213) > system support diagnostic-cli Attaching to ASA console ... Press 'Ctrl+a then d' to detach. Type help or '?' for a list of available commands. firepower> en Password: firepower# ping 192.168.0.192
system support diagnostic-cli
. For the packet capture commands, refer to ASA Packet Captures with CLI and ASDM Configuration Example.Revision | Publish Date | Comments |
---|---|---|
3.0 |
10-Jul-2023 |
recertification |
2.0 |
15-Jun-2022 |
Edited content for clarity. Added image to "Background Information." Updated I.P. address to private I.P. address. |
1.0 |
13-May-2016 |
Initial Release |