Vendor - Cisco
Product - Application Control Engine (ACE)
Ref |
Link |
Splunk Add-on |
None |
Sourcetypes
sourcetype |
notes |
cisco:ace |
This source type is also used for ACE |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_ace |
cisco:ace |
netops |
none |
Filter type
- Cisco ACE products can be identified by message parsing alone
Setup and Configuration
Unknown this product is unsupported by Cisco
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_ACE_UDP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_CISCO_ACE_TCP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_CISCO_ACE |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_ACE_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:ace | stats count by host
Product - Cisco Access Control System (ACS)
Ref |
Link |
Splunk Add-on |
https://splunkbase.splunk.com/app/1811/ |
Product Manual |
https://community.cisco.com/t5/security-documents/acs-5-x-configuring-the-external-syslog-server/ta-p/3143143 |
Sourcetypes
sourcetype |
notes |
cisco:acs |
Aggregation used |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_acs |
cisco:acs |
netauth |
None |
Filter type
PATTERN MATCH
Setup and Configuration
- Replace the following extract using Splunk local configuration. Impacts version 1.5.0 of the addond
EXTRACT-AA-signature = CSCOacs_(?<signature>\S+):?
# Note the value of this config is empty to disable
EXTRACT-AA-syslog_message =
EXTRACT-acs_message_header2 = ^CSCOacs_\S+\s+(?<log_session_id>\S+)\s+(?<total_segments>\d+)\s+(?<segment_number>\d+)\s+(?<acs_message>.*)
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_ACS_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_CISCO_ACS_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_CISCO_ACS |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_ACS_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:acs
Verify timestamp, and host values match as expected
Product - ASA AND FTD (Firepower)
Including Legacy FWSM and PIX
Ref |
Link |
Splunk Add-on for ASA (No long supports FWSM and PIX) |
https://splunkbase.splunk.com/app/1620/ |
Cisco eStreamer for Splunk |
https://splunkbase.splunk.com/app/1629/ |
Product Manual |
https://www.cisco.com/c/en/us/td/docs/security/asa/asa82/configuration/guide/config/monitor_syslog.html |
Sourcetypes
sourcetype |
notes |
cisco:asa |
cisco FTD Firepower will also use this source type except those noted below |
cisco:ftd |
cisco FTD Firepower will also use this source type except those noted below |
cisco:fwsm |
Splunk has |
cisco:pix |
cisco PIX will also use this source type except those noted below |
cisco:firepower:syslog |
FTD Unified events see https://www.cisco.com/c/en/us/td/docs/security/firepower/Syslogs/b_fptd_syslog_guide.pdf |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_asa |
cisco:asa |
netfw |
none |
cisco_fwsm |
cisco:fwsm |
netfw |
none |
cisco_pix |
cisco:pix |
netfw |
none |
cisco_firepower |
cisco:firepower:syslog |
netids |
none |
cisco_ftd |
cisco:ftd |
netfw |
none |
Filter type
MSG Parse: This filter parses message content
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- Follow vendor configuration steps per Product Manual above ensure:
- Log Level is 6 “Informational”
- Protocol is TCP/IP
- permit-hostdown is on
- device-id is hostname and included
- timestamp is included
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_ASA_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_CISCO_ASA_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_CISCO_ASA |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_ASA_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
SC4S_LISTEN_CISCO_ASA_LEGACY_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers expecting RFC3164 format |
SC4S_LISTEN_CISCO_ASA_LEGACY_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers expecting RFC3164 format |
SC4S_ARCHIVE_CISCO_ASA_LEGACY |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_ASA_LEGACY_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:asa
Verify timestamp, and host values match as expected
Product - Cisco Email Security Appliance (ESA)
Ref |
Link |
Splunk Add-on |
https://splunkbase.splunk.com/app/1761/ |
Product Manual |
https://www.cisco.com/c/en/us/td/docs/security/esa/esa13-5-1/user_guide/b_ESA_Admin_Guide_13-5-1.html |
Sourcetypes
sourcetype |
notes |
cisco:esa:http |
The HTTP logs of Cisco IronPort ESA record information about the secure HTTP services enabled on the interface. |
cisco:esa:textmail |
Text mail logs of Cisco IronPort ESA record email information and status. |
cisco:esa:amp |
Advanced Malware Protection (AMP) of Cisco IronPort ESA records malware detection and blocking, continuous analysis, and retrospective alerting details. |
cisco:esa:authentication |
These logs record successful user logins and unsuccessful login attempts. |
cisco:esa:cef |
The Consolidated Event Logs summarizes each message event in a single log line. |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_esa |
cisco:esa:http |
email |
None |
cisco_esa |
cisco:esa:textmail |
email |
None |
cisco_esa |
cisco:esa:amp |
email |
None |
cisco_esa |
cisco:esa:authentication |
email |
None |
cisco_esa |
cisco:esa:cef |
email |
None |
Filter type
IP, Netmask or Host
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- ESA Follow vendor configuration steps per Product Manual.
- Ensure host and timestamp are included.
- Update
vi /opt/sc4s/local/context/vendor_product_by_source.conf
update the host or ip mask for f_cisco_esa
to identiy the esa events.
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_ESA_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_CISCO_ESA_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_CISCO_ESA |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_ESA_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present
index=email sourcetype=cisco:esa:*
Verify timestamp, and host values match as expected
Product - Cisco Integrated Management Controller (IMC)
Ref |
Link |
Splunk Add-on |
na |
Product Manual |
multiple |
Sourcetypes
sourcetype |
notes |
cisco:ucm |
None |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_cimc |
cisco:infraops |
infraops |
None |
Filter type
PATTERN MATCH
Setup and Configuration
- Refer to Cisco support web site
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_CIMC_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_CISCO_CIMC_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_CISCO_CIMC |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_CIMC_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:cimc
Verify timestamp, and host values match as expected
Product - Cisco Networking (IOS and flavors)
Cisco Network Products of multiple types share common logging characteristics the following types are known to be compatible:
- Cisco AireOS (AP & WLC)
- Cisco APIC/ACI
- Cisco IOS
- Cisco IOS-XR
- Cisco IOS-XE
- Cisco NX-OS
- Cisco FX-OS
Ref |
Link |
Splunk Add-on |
https://splunkbase.splunk.com/app/1467/ |
IOS Manual |
https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst2960/software/release/12-2_55_se/configuration/guide/scg_2960/swlog.html |
NX-OS Manual |
https://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/6-x/system_management/configuration/guide/b_Cisco_Nexus_9000_Series_NX-OS_System_Management_Configuration_Guide/sm_5syslog.html |
Cisco ACI |
https://community.cisco.com/legacyfs/online/attachments/document/technote-aci-syslog_external-v1.pdf |
Cisco WLC & AP |
https://www.cisco.com/c/en/us/support/docs/wireless/4100-series-wireless-lan-controllers/107252-WLC-Syslog-Server.html#anc8 |
Sourcetypes
sourcetype |
notes |
cisco:ios |
This source type is also used for NX-OS, ACI and WLC product lines |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_ios |
cisco:ios |
netops |
none |
Filter type
- Cisco IOS products can be identified by message parsing alone
- Cisco WLC, and ACI products must be identified by host or ip assignment update the filter
f_cisco_ios
as required
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- IOS Follow vendor configuration steps per Product Manual above ensure:
- Ensure a reliable NTP server is set and synced
- Log Level is 6 “Informational”
- Protocol is TCP/IP
- permit-hostdown is on
- device-id is hostname and included
- timestamp is included
- NX-OS Follow vendor configuration steps per Product Manual above ensure:
- Ensure a reliable NTP server is set and synced
- Log Level is 6 “Informational” user may select alternate levels by module based on use cases
- Protocol is TCP/IP
- device-id is hostname and included
- timestamp is included and milisecond accuracy selected
- ACI Logging configuration of the ACI product often varies by use case.
- Ensure NTP sync is configured and active
- Ensure proper host names are configured
- WLC
- Ensure NTP sync is configured and active
- Ensure proper host names are configured
- For security use cases per AP logging is required
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_IOS_UDP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_CISCO_IOS_TCP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_CISCO_IOS |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_IOS_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present, for NX-OS, WLC and ACI products ensure each host filter condition is verified
index=<asconfigured> sourcetype=cisco:ios | stats count by host
Product - Cisco Identity Services Engine (ISE)
Ref |
Link |
Splunk Add-on |
https://splunkbase.splunk.com/app/1915/ |
Product Manual |
https://www.cisco.com/c/en/us/td/docs/security/ise/2-6/Cisco_ISE_Syslogs/Cisco_ISE_Syslogs/Cisco_ISE_Syslogs_chapter_00.html |
Sourcetypes
sourcetype |
notes |
cisco:ise:syslog |
Aggregation used |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_ise |
cisco:ise:syslog |
netauth |
None |
Filter type
PATTERN MATCH
Setup and Configuration
- No special steps required
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_ISE_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers expecting RFC5424 format |
SC4S_LISTEN_CISCO_ISE_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers expecting RFC5424 format |
SC4S_ARCHIVE_CISCO_ISE |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_ISE_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:ise:syslog
Verify timestamp, and host values match as expected
Product - Meraki Product Line (MR, MS, MX, MV)
Ref |
Link |
Splunk Add-on |
https://splunkbase.splunk.com/app/3018/ |
Product Manual |
https://documentation.meraki.com/zGeneral_Administration/Monitoring_and_Reporting/Syslog_Server_Overview_and_Configuration |
Sourcetypes
sourcetype |
notes |
meraki |
None |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_meraki |
meraki |
netfw |
The current TA does not sub sourcetype or utilize source preventing segmenation into more appropriate indexes |
Filter type
IP, Netmask, Host or Port
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- Review and update the splunk_metadata.csv file and set the index and sourcetype as required for the data source.
- Follow vendor configuration steps per Product Manual above
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_MERAKI_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers expecting RFC5424 format |
SC4S_LISTEN_CISCO_MERAKI_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers expecting RFC5424 format |
SC4S_ARCHIVE_CISCO_MERAKI |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_MERAKI_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=merkai
Verify timestamp, and host values match as expected
Product - Cisco TelePresence Video Communication Server (TVCS)
Ref |
Link |
Product Manual |
https://www.cisco.com/c/en/us/products/unified-communications/telepresence-video-communication-server-vcs/index.html |
Sourcetypes
sourcetype |
notes |
cisco:vcs |
none |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_tvcs |
cisco:tvcs |
main |
none |
Filter type
MSG Parse: This filter parses message content
Setup and Configuration
Source side unknown
| Variable | default | description |
|----------------|----------------|----------------|
| SC4S_LISTEN_CISCO_TVCS_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
| SC4S_LISTEN_CISCO_TVCS_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
| SC4S_ARCHIVE_CISCO_TVCS | no | Enable archive to disk for this specific source |
| SC4S_DEST_CISCO_TVCS_HEC | no | When Splunk HEC is disabled globally set to yes to enable this specific source |
| SC4S_LISTEN_CISCO_TVCS_LEGACY_TCP_PORT | empty string | Enable a TCP port for this specific vendor product using a comma-separated list of port numbers expecting RFC3164 format |
| SC4S_LISTEN_CISCO_TVCS_LEGACY_UDP_PORT | empty string | Enable a UDP port for this specific vendor product using a comma-separated list of port numbers expecting RFC3164 format |
| SC4S_ARCHIVE_CISCO_TVCS_LEGACY | no | Enable archive to disk for this specific source |
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:tvcs
Verify timestamp, and host values match as expected
Product - Cisco Unified Communications Manager (UCM)
Ref |
Link |
Splunk Add-on |
na |
Product Manual |
multiple |
Sourcetypes
sourcetype |
notes |
cisco:ucm |
None |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_ucm |
cisco:ucm |
ucm |
None |
Filter type
PATTERN MATCH
Setup and Configuration
- Refer to Cisco support web site
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_UCM_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_CISCO_UCM_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_CISCO_UCM |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_UCM_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:ucm
Verify timestamp, and host values match as expected
Product - Cisco Unified Computing System (UCS)
Ref |
Link |
Splunk Add-on |
na |
Product Manual |
multiple |
Sourcetypes
sourcetype |
notes |
cisco:ucs |
None |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_ucs |
cisco:ucs |
infraops |
None |
Filter type
PATTERN MATCH
Setup and Configuration
- Refer to Cisco support web site
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_UCS_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_CISCO_UCS_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_CISCO_UCS |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_UCS_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:ucs
Verify timestamp, and host values match as expected
Product - Cisco UCS Hyperflex
Ref |
Link |
Splunk Add-on |
na |
Product Manual |
multiple |
Sourcetypes
sourcetype |
notes |
cisco:ucs:hx |
None |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_ucs_hx |
cisco:ucs:hx |
infraops |
None |
Filter type
PATTERN MATCH
Setup and Configuration
- Refer to Cisco support web site
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_UCS_HX_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_CISCO_UCS_HX_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_CISCO_UCS_HX |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_UCS_HX_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present
index=<asconfigured> sourcetype=cisco:ucs:hx
Verify timestamp, and host values match as expected
Product - Cisco Web Security Appliance (WSA)
Ref |
Link |
Splunk Add-on |
https://splunkbase.splunk.com/app/1747/ |
Product Manual |
https://www.cisco.com/c/en/us/td/docs/security/wsa/wsa11-7/user_guide/b_WSA_UserGuide_11_7.html |
- Update
vi /opt/sc4s/local/context/vendor_product_by_source.conf
update the host or ip mask for f_cisco_wsa
to identiy the wsa squid events prior to WSA v11.7 and f_cisco_wsa11_7
to identify the squid events since WSA v11.7. Update the host or ip mask for f_cisco_wsa_w3crecommended
to identify the wsa w3c events since WSA v12.5.
Sourcetypes
| cisco:wsa:l4tm | The L4TM logs of Cisco IronPort WSA record sites added to the L4TM block and allow lists. |
| cisco:wsa:squid | The access logs of Cisco IronPort WSA version prior to 11.7 record Web Proxy client history in squid. |
| cisco:wsa:squid:new | The access logs of Cisco IronPort WSA version since 11.7 record Web Proxy client history in squid. |
| cisco:wsa:w3c:recommended | The access logs of Cisco IronPort WSA version since 12.5 record Web Proxy client history in W3C. |
Sourcetype and Index Configuration
key |
sourcetype |
index |
notes |
cisco_wsa |
cisco:wsa:l4tm |
netproxy |
None |
cisco_wsa |
cisco:wsa:squid |
netproxy |
None |
cisco_wsa |
cisco:wsa:squid:new |
netproxy |
None |
cisco_wsa |
cisco:wsa:w3c:recommended |
netproxy |
None |
Filter type
IP, Netmask or Host
Setup and Configuration
- Install the Splunk Add-on on the search head(s) for the user communities interested in this data source. If SC4S is exclusively used the addon is not required on the indexer.
- WSA Follow vendor configuration steps per Product Manual.
- Ensure host and timestamp are included.
Options
Variable |
default |
description |
SC4S_LISTEN_CISCO_WSA_TCP_PORT |
empty string |
Enable a TCP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_LISTEN_CISCO_WSA_UDP_PORT |
empty string |
Enable a UDP port for this specific vendor product using a comma-separated list of port numbers |
SC4S_ARCHIVE_CISCO_WSA |
no |
Enable archive to disk for this specific source |
SC4S_DEST_CISCO_WSA_HEC |
no |
When Splunk HEC is disabled globally set to yes to enable this specific source |
Verification
Use the following search to validate events are present
index=netops sourcetype=cisco:wsa:*
Verify timestamp, and host values match as expected