![enable send snmp cisco asa asdm enable send snmp cisco asa asdm](https://i.stack.imgur.com/CF5Vy.png)
The following commands will show the state of the SLA monitor. I currently have two Cisco ASA 5100 routers. We can also configure the size of the internal buffer: ASA1 (config) logging buffer-size 8192. This will log all syslog messages with level warnings or lower to the internal buffer. By default it’s enabled so let’s enable it: ASA1 (config) logging buffered warnings. %ASA-6-622001: Removing tracked route 93.184.216.34 255.255.255.255 95.95.95.95, distance 1, table default, on interface OUTSIDE Show commands The ASA has an internal buffer that we can use for syslog messages. Using a hex to ascii converter it then looks like this: SNMP generates detailed syslog messages that are numbered 212nnn. 3 Steps total Step 1: Enable Logging: logging enable logging timestamp Step 2. The varbind E:9.9.41.1.2.3.1.5.0 is hex encoded. Use of the snmp-server host command creates an ASA rule to allow incoming SNMP traffic. Here I'll describe setting up a Cisco ASA to send e-mail alerts from the command line. This configuration is valid for both, a standalone Firewall and the Firewalls that are in High availability mode.