Configure a Syslog Server
To configure a syslog server to handle messages generated from your system, perform the following steps.
If you want this syslog server to receive security events such as connection and intrusion events, see also Threat Defense Platform Settings That Apply to Security Event Syslog Messages.
Note | In 7.4 and later, the Management and Diagnostic interfaces are merged. If Platform Settings for syslog servers or SNMP hosts specify the Diagnostic interface by name, then you must use separate Platform Settings policies for merged and unmerged devices (7.3 and earlier, and some upgraded 7.4 threat defenses). |
Before you begin
-
See requirements in Guidelines for Logging.
-
Make sure your devices can reach your syslog collector on the network.
Procedure
Step 1 | Choose threat defense policy. and create or edit the | ||
Step 2 | Select . | ||
Step 3 | Check the Allow user traffic to pass when TCP syslog server is down (Recommended) check box, to allow traffic if any syslog server that is using the TCP protocol is down.
| ||
Step 4 | In the Message queue size (messages) field, enter a size of the queue for storing syslog messages on the security appliance when syslog server is busy. The minimum is 1 message. The default is 512. Specify 0 to allow an unlimited number of messages to be queued (subject to available block memory). When the messages exceed the configured queue size, they are dropped and result in missing syslog. To determine the ideal queue size, you need to identify the available block memory. Use the show blocks command to know the current memory utilization. For more information on the command and its attributes, see Cisco Secure Firewall ASA Series Command Reference Guide. For further assistance, contact Cisco TAC. | ||
Step 5 | Click Add to add a new syslog server. | ||
Step 6 | Click Save. You can now go to and deploy the policy to assigned devices. The changes are not active until you deploy them. |
What to do next
-
Deploy configuration changes.