I am trying to log URLs that are being requested through my PIX FW by internal users. I can get this to work somewhat by using syslog and logging message 304001. This logs all URLs being requested through the PIX for both inside requests and outside requests but it seems to remove the actual requested hostname in the URL and replaces it with an IP address. Is there anyway to get it to stop removing the hostname? I need to show this to different managers in different departments and cannot show them a bunch of IP addresses. Or is there a better way to track the URLs being requested by inside hosts using the PIX than this method? PIX version is 7.2(3) . Here is the relevant configuration:
pager lines 24 logging enable logging standby logging buffered informational logging trap informational logging host inside x.x.x.x logging host inside sysloghost no logging message 313003 no logging message 313001 no logging message 305012 no logging message 305011 no logging message 302015 no logging message 302014 no logging message 302013 no logging message 302012 no logging message 609002 no logging message 609001 no logging message 302016 no logging message 302021 no logging message 302020
Latest I see as being available for download is the one I am running which does not contain the fix. There is an 8.0.5 for ASA but none for PIX. At least when I visit the download page. The TAC is sending me the 8.0.4(24) version over now which should fix me up.I will ask about the 8.0.5 though. Thanks for the input.
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :