It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Integrating a Cisco Adaptive Security Appliance

  • Last updated on

For full instructions, see Cisco.

To send Logging Information to a Syslog Server

logging host interface_name ip_address [tcp[/port] | udp[/port]] [format emblem]
logging trap severity_level
logging facility number 

A server that runs a syslog application is required in order to send syslog messages to an external host. ASA sends syslog on UDP port 514 by default, but protocol and port can be chosen. If TCP is chosen as the logging protocol, this causes the ASA to send syslogs via a TCP connection to the syslog server. If the server is inaccessible, or the TCP connection to the server cannot be established, the ASA will, by default, block ALL new connections. This behavior can be disabled if you enable logging permit-hostdown. See the configuration guide for more information about the logging permit-hostdown command.

 

The ASA only allows ports ranging from 1025-65535. Use of any other ports will result in the following error: 

ciscoasa(config)# logging host tftp 192.168.1.1 udp/516\
WARNING: interface Ethernet0/1 security level is 0.\
**ERROR: Port '516' is not within the range 1025-65535.**