Completely agree with splunk for log searching / analysis, even has some 
ASA/PIX modules.  Please note, unless something has changed that I completely 
missed, an ASA/PIX will stop forwarding user traffic if it is configured for 
tcp syslogs and the connection breaks.  (no more disk, network issue, etc) This 
is based on the premise that a system cannot be considered secure if the audit 
trail is unavailable, and tcp syslogging(vs udp) is usually used to make sure 
you don't miss an entry due to a dropped packet.  Something that dates back to 
the old C2 security standard??(not sure of the current version).   Typically 
this requires admin intervention (by design) to clear the condition.   If you 
use udp for syslog the ASA won't be in this mode, and you won't block traffic 
if syslog fails.  With that said, there may be a command I'm unaware of that 
allows a tcp syslog to fail and not block traffic.  

~jdh

-----Original Message-----
From: Joel M Snyder [mailto:[email protected]] 
Sent: Sunday, November 20, 2011 12:11 AM
To: [email protected]
Subject: Re: ASA log viewer

 >I'd like to fully search on an 'column', a la 'ladder logic' style.,  >as 
 >well as have the data presented in an orderly well-defined fashion.

Yes, Splunk.

See:
http://www.networkworld.com/reviews/2011/092611-splunk-test-250836.html

for a recent Network World test of Splunk which may help.

jms


--
Joel M Snyder, 1404 East Lind Road, Tucson, AZ, 85719
Senior Partner, Opus One       Phone: +1 520 324 0494
[email protected]                http://www.opus1.com/jms

______________________________________________________________________________________________________

The information contained in this electronic message and any attachments is 
confidential, 
is for the sole use of the intended recipient(s) and may contain privileged 
information. 
Any unauthorized review, use, disclosure or distribution is prohibited. If you 
are not the 
intended recipient, you must not read, use or disseminate the information, and 
should immediately 
contact the sender by reply email and destroy all copies of the original 
message.


Reply via email to