# Cisco ASA with FirePOWER services

## Cisco ASA with FirePOWER services&#x20;

Creating a Syslog Alert Response&#x20;

1.  Choose ASA Firepower Configuration > Policies > Actions > Alerts.&#x20;
2.  From the Create Alert drop-down menu, choose Create Syslog Alert.&#x20;
3.  Enter a Name for the alert.&#x20;
4.  In the Host field, enter the hostname or IP address of “Log Collector”.&#x20;
5.  In the Port field, enter the port the server uses for syslog messages. Please check Appendix A for default port list.&#x20;
6.  From the Facility list, choose a facility LOCAL7.&#x20;
7.  From the Severity list, choose a severity INFO.&#x20;
8.  Click Save.&#x20;

!\[Graphical user interface, website

Description automatically generated]\(<https://firebasestorage.googleapis.com/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MMRHZBPHlLDUc8519fX%2Fuploads%2FWZuXLuuON7wzpuhdNPoM%2Ffile.png?alt=media>)

Configuration for sending the Traffic Events&#x20;

1. Navigate to ASA Firepower Configuration > Policies > Access Control Policy&#x20;
2. Edit the access rule and navigate to logging option.&#x20;
3. Select log at Beginning and End of Connection options.&#x20;
4. Navigate to Send Connection Events to option , select Syslog, and then select a Syslog alert response.&#x20;
5. Click Save.&#x20;

!\[Graphical user interface, text, application

Description automatically generated]\(<https://firebasestorage.googleapis.com/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MMRHZBPHlLDUc8519fX%2Fuploads%2FOC5d7ECeBkIMldtAtuyw%2Ffile.jpeg?alt=media>)

 <https://www.cisco.com/c/en/us/support/docs/security/firepower-ngfw/200479-Configure-Logging-on-FTD-via-FMC.html>
