Connection Logging Guide
Connection Logging Guide
The following topics describe how to configure the Firepower System to log connections made by hosts on
your monitored network:
• About Connection Logging, on page 1
• Limitations of Connection Logging, on page 9
• Best Practices for Connection Logging, on page 9
• Configure Connection Logging, on page 12
Log connections according to the security and compliance needs of your organization. When setting up
connection logging, keep in mind that the system can log a connection for multiple reasons, and that disabling
logging in one place does not mean that matching connections will not be logged.
The information in a connection event depends on several factors, including traffic characteristics, the
configuration that ultimately handled the connection, and so on.
Note You can supplement the connection logs gathered by your managed devices with connection data generated
from exported NetFlow records. This is especially useful if you have NetFlow-enabled routers or other devices
deployed on networks that your Firepower System managed devices cannot monitor.
Connection Logging
1
Connection Logging
Connections That Are Always Logged
Related Topics
Netflow Data in the Firepower System
Note File events generated by inspecting NetBIOS-SSN (SMB) traffic do not immediately generate connection
events because the client and server establish a persistent connection. The system generates connection events
after the client or server ends the session.
Monitored Connections
The system always logs the ends of connections for monitored traffic, even if the traffic matches no other
rules and you do not enable default action logging. For more information, see Logging for Monitored
Connections, on page 4.
Connection Logging
2
Connection Logging
How Rules and Policy Actions Affect Logging
Connection Logging
3
Connection Logging
Logging for Fastpathed Connections
Fastpathed traffic bypasses the rest of access control and QoS, so connection events for fastpathed connections
contain limited information. You cannot log connections fastpathed with 8000 Series fastpath rules.
The system does not generate a separate event each time a single connection matches a Monitor rule. Because
a single connection can match multiple Monitor rules, each connection event can include and display information
on the first eight Monitor access control rules that the connection matches, as well as the first matching SSL
Monitor rule.
Similarly, if you send connection events to an external syslog or SNMP trap server, the system does not send
a separate alert each time a single connection matches a Monitor rule. Rather, the alert that the system sends
at the end of the connection contains information on the Monitor rules the connection matched.
Note Although you can log trusted connections, we recommend you do not do so because trusted connections are
not subject to deep inspection or discovery, so connection events for trusted connections contain limited
information.
The system logs TCP connections handled by a Trust access control rule differently depending on the device
that detected the connection:
• For 7000 and 8000 Series devices, TCP connections detected by a Trust rule on the first packet generate
different events depending on the presence of a preceding enabled Monitor rule. If the Monitor rule is
active, the system evaluates the packet and generates both a beginning and end-of-connection event. If
no Monitor rule is active, the system generates only an end-of-connection event.
Connection Logging
4
Connection Logging
Logging for Blocked Connections
• For all other models, TCP connections detected by a Trust rule on the first packet generate only an
end-of-connection event. The system generates the event one hour after the final session packet.
Only devices deployed inline (that is, using routed, switched, or transparent interfaces, or inline interface
pairs) can block traffic. Because blocked connections are not actually blocked in passive deployments, the
system may report multiple beginning-of-connection events for each blocked connection.
Caution Logging blocked TCP connections during a Denial of Service (DoS) attack can affect system performance
and overwhelm the database with multiple similar events. Before you enable logging for an Block rule, consider
whether the rule monitors traffic on an Internet-facing interface or other interface vulnerable to DoS attack.
Connection Logging
5
Connection Logging
Logging for Allowed Connections
• A beginning-of-connection event when a user’s request is initially blocked and the warning page is
displayed; this event has an associated action of Interactive Block or Interactive Block with Reset
• Multiple beginning- or end-of-connection events if the user clicks through the warning page and loads
the originally requested page; these events have an associated action of Allow and a reason of User
Bypass
Enabling logging for these configurations ensures the connection is logged, while also permitting (or specifying)
the next phase of inspection and traffic handling. SSL logging is always end-of-connection; access control
configurations also allow beginning-of-connection logging.
Although the Analyze action in tunnel and prefilter rules also allows connections to continue with access
control, logging is disabled for rules with this action. Matching connections may still be logged by other
configurations. Allowed tunnels might have their encapsulated sessions evaluated and logged individually.
When you allow traffic with an access control rule or default action, you can use an associated intrusion policy
to further inspect traffic and block intrusions. For access control rules, you can also use a file policy to detect
and block prohibited files, incuding malware. Unless you disable connection event storage, the system
automatically logs most allowed connections associated with intrusion, file, and malware events. For detailed
information, see Connections That Are Always Logged, on page 2.
Connections with encrypted payloads are not subject to deep inspection, so connection events for encrypted
connections contain limited information.
Connection Logging
6
Connection Logging
Beginning vs End-of-Connection Logging
• File events, which represent detected or blocked files, including malware files
• Malware events, which represent detected or blocked malware files only
• Retrospective malware events, which are generated when the malware disposition for a previously detected
file changes
You can disable this logging on a per-access-control-rule basis. You can also disable file and malware event
storage entirely.
Note We recommend you leave file and malware event logging enabled.
To optimize performance, log either the beginning or the end of any connection, but not both. Monitoring a
connection for any reason forces end-of-connection logging. For a single non-blocked connection, the
end-of-connection event contains all of the information in the beginning-of-connection event, as well as
information gathered over the duration of the session.
The following table details the differences between beginning and end-of-connection events, including the
advantages to logging each.
Can be generated... When the system detects the When the system:
beginning of a connection (or, after
• Detects the close of a
the first few packets if event
connection
generation depends on application
or URL identification) • Does not detect the end of a
connection after a period of
time
• Can no longer track the
session due to memory
constraints
Connection Logging
7
Connection Logging
Firepower Management Center vs External Logging
The number of events the Firepower Management Center can store depends on its model.
Connection Logging
8
Connection Logging
Limitations of Connection Logging
Note To use these features, you must log connections (and in most cases, the end of those connections rather than
the beginning). This is why the system automatically logs critical connections—those associated with logged
intrusions, prohibited files, and malware.
You can also log events to an external syslog or SNMP trap server, using a connection you configure called
an alert response.
Related Topics
Firepower Management Center Alert Responses
If a connection event does not contain the information you think it should, see Requirements for Populating
Connection Event Fields and Information Available in Connection Event Fields.
Connection Logging
9
Connection Logging
Best Practices for Connection Logging
So that you log only critical connections, enable connection logging on a per-access-control-rule basis.
(As previously mentioned, you can still monitor this traffic for threats.)
As discussed in Connections That Are Always Logged, on page 2, even if you disable logging for the
preceding, intrusion events, malware, and IAB are still logged.
Connection Logging
10
Connection Logging
Best Practices for Connection Logging
Connection Logging
11
Connection Logging
Configure Connection Logging
Procedure
Step 1 In the prefilter policy editor, click the edit icon ( ) next to the rule where you want to configure logging.
If a view icon ( ) appears instead, the configuration belongs to an ancestor domain, or you do not have
permission to modify the configuration.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes.
Connection Logging
12
Connection Logging
Logging Decryptable Connections with SSL Rules
Procedure
Step 1 In the SSL policy editor, click the edit icon ( ) next to the rule where you want to configure logging.
If a view icon ( ) appears instead, the configuration belongs to an ancestor domain, or you do not have
permission to modify the configuration.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes.
Procedure
Step 1 In the access control policy editor, click the Security Intelligence tab.
Step 2 Click the logging icons ( ) to enable Security Intelligenge logging using the following critera:
• By IP address—Click the logging icon next to Networks.
Connection Logging
13
Connection Logging
Logging Connections with Access Control Rules
What to do next
• Deploy configuration changes; see Deploy Configuration Changes.
Depending on your choices for the rule action and deep inspection options, your logging options differ; see
How Rules and Policy Actions Affect Logging, on page 3.
Procedure
Step 1 In the access control policy editor, click the edit icon ( ) next to the rule where you want to configure logging.
If a view icon ( ) appears instead, the configuration is inherited from an ancestor policy, belongs to an
ancestor domain, or you do not have permission to modify the configuration.
Step 4 (Optional) Check the Log Files check box to log file and malware events associated with the connection.
Cisco recommends you leave this option enabled.
Connection Logging
14
Connection Logging
Logging Connections with a Policy Default Action
• Event Viewer: Send connection events to Firepower Management Center web interface if you want to
perform Firepower Management Center-based analysis on these connection events, or if the rule action
is Monitor.
• Syslog Server: Send connection events to the syslog server configured in the Logging tab in Access
Control Policy, unless overridden.
Show Overrides: Displays the options to override the settings configured in the access control policy.
• Override Severity: When you choose this option and select a severity for the rule, connection events
for this rule will have the selected severity regardless of the severity configured in the Logging tab
in Access Control Policy.
• Override Default Syslog Destination: Send the syslog generated for the connection event for this
rule to destination specified in this alert.
• SNMP Trap: Connection events are sent to the selected SNMP trap.
What to do next
• Deploy configuration changes; see Deploy Configuration Changes.
A policy's default action determines how the system handles traffic that matches none of the rules in the policy
(except Monitor rules in access control and SSL policies, which match and log—but do not handle or
inspect—traffic).
Logging settings for the SSL policy default action also govern how the system logs undecryptable sessions.
Procedure
Step 1 In the policy editor, click the logging icon ( ) next to the Default Action drop-down list.
Step 2 Specify when you want to log matching connections:
Connection Logging
15
Connection Logging
Limiting Logging of Long URLs
What to do next
• Deploy configuration changes; see Deploy Configuration Changes.
End-of-connection events for HTTP traffic record the URL requested by monitored hosts. Disabling or limiting
the number of stored URL characters may improve system performance. Disabling URL logging (storing zero
characters) does not affect URL filtering. The system filters traffic based on requested URLs even though the
system does not record them.
Procedure
Step 1 In the access control policy editor, click the Advanced tab, then click the edit icon ( ) next to General
Settings.
If a view icon ( ) appears instead, the configuration is inherited from an ancestor policy, belongs to an
ancestor domain, or you do not have permission to modify the configuration. If the configuration is unlocked,
uncheck Inherit from base policy to enable editing.
Connection Logging
16
Connection Logging
Limiting Logging of Long URLs
What to do next
• Deploy configuration changes; see Deploy Configuration Changes.
Connection Logging
17
Connection Logging
Limiting Logging of Long URLs
Connection Logging
18