Access list

Unanswered Question
Oct 23rd, 2009
User Badges:


I am trying to find out what this mean when used in with an ACL (access list deny log...); what kind of log is it ? and what is its usage ? I've been looking online but nothing so far.

Another thing : can someone explains what is the best implementation of an ASA: at the core of the network (firewall+vpn concentrator) or behind the core routeur (inside the network, in front of servers)...


  • 1
  • 2
  • 3
  • 4
  • 5
Overall Rating: 0 (0 ratings)
lgijssel Fri, 10/23/2009 - 05:12
User Badges:
  • Red, 2250 points or more

The keyword "log" causes messages to be logged to the configured logging destination. Use "logging buffered" to log the messages in the device.

The ASA is used to connect an insecure network. The best place depends on your preference and the network topology.




This Discussion