- Community Home
- >
- Networking
- >
- Switching and Routing
- >
- Comware Based
- >
- Re: ACL Deny Syslog Logging
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-13-2021 04:05 AM
04-13-2021 04:05 AM
ACL Deny Syslog Logging
Hey All,
Switch is a JG932A, HPE 5130 software 7.1.070 Release 3506P06.
I know this subject has already been tackled in this forum however without success, at least from my end.
The scenario is simple enough:
I have an ACL attached to a VLAN interface. This ACL ends with a deny all. Counting and logging are enabled. I can see that the deny entry is being hit as the counting is increasing in value.
Syslog server is working fine. So much so that I already receive messages from this switch, including debugging level 7 messages when debugging is enabled.
My questions are:
- If I get this to work at all, does it give me the source, destination and ports used for the traffic hitting the deny rule? Or do I get some sort of summarized message mostly good for nothing ?
- How do I configure this? No matter how much I try I simply cannot get it to work.
I have cleaned the config to start mostly from scratch and my info-center is now pretty simple. - Is there any other way to see the traffic hitting the deny rule?
info-center loghost source Vlan-interfacexx
info-center loghost xxx.xxx.xxx.xxx
info-center source default loghost level informational
Any help would be very much appreciated.
Thank you
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-13-2021 07:45 AM - edited 04-13-2021 07:46 AM
04-13-2021 07:45 AM - edited 04-13-2021 07:46 AM
Re: ACL Deny Syslog Logging
Hi @EdDe007 !
- If I get this to work at all, does it give me the source, destination and ports used for the traffic hitting the deny rule? Or do I get some sort of summarized message mostly good for nothing ?
You will get only cummulative statistics which ACL rule has been triggered and how many times since last logging interval. You can't see details of the packet that hit the rule.
The log message will be something like this one:
ACL/6/PFILTER_STATIS_INFO: GigabitEthernet1/0/1 (inbound): Packet-filter 2000 rule 0 permit source 1.1.1.1 0 logging 10000 packet(s).
or
ACL/6/ACL_STATIS_INFO: GigabitEthernet1/0/1 (inbound): Packet-filter 2000 rule 0 permit source 1.1.1.1 0 logging 10000 packet(s).
- How do I configure this? No matter how much I try I simply cannot get it to work. I have cleaned the config to start mostly from scratch and my info-center is now pretty simple.
Start with 'acl logging interval 5' global configuration command. This command will enable sending to logbuffer cummulative reports of ACL rules hits every 5 minutes. The interval must be multiple of 5 in the range of 0 to 1440. 0 means loggind is disabled. You can verify if logs are generated by 'display logbuffer' command. Statistics will be reported only for rules that have 'logging' parameter set. If those messages appear in the logbuffer, they should be sent to the external syslog server as well.
- Is there any other way to see the traffic hitting the deny rule?
There is a way, set 'logging' parameter to the deny rule.