Skip to main content
Solved

Log Reduction Strategies For Cisco ASA Without Impacting SIEM Operations

  • December 24, 2025
  • 1 reply
  • 16 views

This message originated from Cribl Community Slack.
Click here to view the original link.

Hi all, is there anyone having experience to reduce Network device logs(VPN,IPS,FW)? We are currently working on a proposal for log reduction on Cisco ASA devices for our customer. But the customer mind if reduction logs have impact on their SIEM operation. Based on our analysis, we believe that certain logs—such as informational-level messages (e.g., session teardown notifications, routine status updates)—are generally low-value for SIEM correlation and threat detection, and can be safely excluded. So if you have an experience about similar log reduction strategies for Cisco ASA or other network devices, could you share with me?

Best answer by Jon Rust

This is a common strategy, especially when combined with sending a copy of all data to an object store. This provides a way to replay dropped data if they're needed in the future. Check packs.cribl.io for the Cisco ASA pack as a starting point.

1 reply

Jon Rust
Forum|alt.badge.img
  • Employee
  • Answer
  • December 24, 2025
This is a common strategy, especially when combined with sending a copy of all data to an object store. This provides a way to replay dropped data if they're needed in the future. Check packs.cribl.io for the Cisco ASA pack as a starting point.