<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic attached here the syslog. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991916#M1018539</link>
    <description>&lt;P&gt;attached here sample show disk-manager. would you know the logfile name and how can I retrieve it?&lt;/P&gt;</description>
    <pubDate>Fri, 28 Oct 2016 08:03:53 GMT</pubDate>
    <dc:creator>Mady</dc:creator>
    <dc:date>2016-10-28T08:03:53Z</dc:date>
    <item>
      <title>CLI command to extract IPS event logs from Firepower Sensor</title>
      <link>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991910#M1018533</link>
      <description>&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"&gt;Hi,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"&gt;Please help me extract the&amp;nbsp;" Connection Events", "Security Intelligence Events", "Malware Events" and "IPS Events"&amp;nbsp;from sensor via CLI. Hope you can provide me&amp;nbsp;the command. I need this for our network audit activity.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"&gt;Thank you in advance.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-size: 12pt; font-family: arial, helvetica, sans-serif;"&gt;Mady&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 13:10:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991910#M1018533</guid>
      <dc:creator>Mady</dc:creator>
      <dc:date>2019-03-12T13:10:49Z</dc:date>
    </item>
    <item>
      <title>Events are being stored on</title>
      <link>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991911#M1018534</link>
      <description>&lt;P&gt;Events are being stored on FMC in a MySQL database. The schema is documented&amp;nbsp;&lt;A href="http://www.cisco.com/c/en/us/td/docs/security/firepower/610/api/db-access/Database_Access.html"&gt;here&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;There is an option on FMC to permit remote database access so you could just use MySQL Workstation and build some sql queries to get the event data you are looking for.&lt;/P&gt;
&lt;P&gt;Another option would be configuring syslog forwarding on fmc which might be the easier solution.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Let me know if you need further assistance&lt;/P&gt;</description>
      <pubDate>Thu, 27 Oct 2016 18:34:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991911#M1018534</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-10-27T18:34:41Z</dc:date>
    </item>
    <item>
      <title>Hi ok0000007,</title>
      <link>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991912#M1018535</link>
      <description>&lt;P&gt;Hi&amp;nbsp;ok0000007,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you for your response. So there is no way to get the logs from IPS directly?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Mady&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 00:20:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991912#M1018535</guid>
      <dc:creator>Mady</dc:creator>
      <dc:date>2016-10-28T00:20:44Z</dc:date>
    </item>
    <item>
      <title>There is no documented /</title>
      <link>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991913#M1018536</link>
      <description>&lt;P&gt;There is no documented / supported way to do this via DB. I have checked the sensor db scheme and could not find the appropriate event tables.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Is there a reason for not polling Firepower Management Center?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 07:26:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991913#M1018536</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-10-28T07:26:53Z</dc:date>
    </item>
    <item>
      <title>If we configure the syslog,</title>
      <link>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991914#M1018537</link>
      <description>&lt;P&gt;If we configure the syslog, can we get all the connection logs or IPS logs from sensor?&lt;/P&gt;
&lt;P&gt;we wanted to get the logs from past weeks or months, that's why we're looking for the commands to get it directly from the sensor.&lt;/P&gt;
&lt;P&gt;Also, if we issue show disk-manager there are connection events and IPS events, so I am wondering if we could get the logs from there.&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 07:35:59 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991914#M1018537</guid>
      <dc:creator>Mady</dc:creator>
      <dc:date>2016-10-28T07:35:59Z</dc:date>
    </item>
    <item>
      <title>Connection logs for several</title>
      <link>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991915#M1018538</link>
      <description>&lt;P&gt;Connection logs for several weeks/months wont be possible imo. I have checked disk-manager on FTD 6.1 and there are no connection events logged. In case your platform logs connection logs directly to the sensor they will most likely get rotated pretty fast since the max event storage will fill up&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Snort events are indeed logged on disk. If you want to check the files you have to locate the following files using bash on the sensor...&lt;/P&gt;
&lt;P&gt;snort-unified.alert&lt;/P&gt;
&lt;P&gt;snort-unified.log&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;e.g.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;gt; expert&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;admin@firepower:/home/admin# sudo su -&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;root@&lt;SPAN&gt;firepower&lt;/SPAN&gt;:/home/admin# updatedb&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;root@&lt;SPAN&gt;firepower&lt;/SPAN&gt;:/home/admin# locate snort-unified.alert&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you want to check the connection logs you have to find the configuration file for diskmanager at&amp;nbsp;/etc/sf/diskmanager.conf and locate the logfile name.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;For the future I would recommand logging FMC alerts to syslog and forwarding connection events to syslog for longterm data collection.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;p.s Enabling syslog now will only send new events to your syslog server.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 08:02:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991915#M1018538</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-10-28T08:02:39Z</dc:date>
    </item>
    <item>
      <title>attached here the syslog.</title>
      <link>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991916#M1018539</link>
      <description>&lt;P&gt;attached here sample show disk-manager. would you know the logfile name and how can I retrieve it?&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 08:03:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991916#M1018539</guid>
      <dc:creator>Mady</dc:creator>
      <dc:date>2016-10-28T08:03:53Z</dc:date>
    </item>
    <item>
      <title>Hi Mady</title>
      <link>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991917#M1018540</link>
      <description>&lt;P&gt;Hi Mady&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have documented the procedure for locating the ips events. You may want to check the file using &lt;STRONG&gt;cat&lt;/STRONG&gt; or &lt;STRONG&gt;vi&lt;/STRONG&gt; and if it matches what you are looking for use &lt;STRONG&gt;scp&lt;/STRONG&gt; to copy it to another system.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I checked the connection logs on a firepower module and could only locate bogus data referencing IDs. You might want to open a TAC case to get the data in a useable format via a query.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Oct 2016 09:00:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991917#M1018540</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-10-28T09:00:20Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991918#M1018541</link>
      <description>Hi,

Thank you very much. You are really helpful. Can you give me some sommands on how can I find the logs file i needed? Also, I already opened Cisco TAC but they are still in the process on checking the documents to extract the logs that I needed. You answer much quicker than them &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; You must be a TAC engineer too. 

Regards,
Mady</description>
      <pubDate>Fri, 28 Oct 2016 09:32:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991918#M1018541</guid>
      <dc:creator>Mady</dc:creator>
      <dc:date>2016-10-28T09:32:23Z</dc:date>
    </item>
    <item>
      <title>According to diskmanager.conf</title>
      <link>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991919#M1018542</link>
      <description>&lt;P&gt;According to diskmanager.conf the connection events are only stored in a shared memory segment which includes a non human readable event log, so extracting historical data from sensor wont be feasable imo.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;As for the ips events they are located in /var/sf/detection_engine. For finding the complete path you may use the commands i posted earlier to search for the specific files.&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;1. Change to linux shell&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&amp;gt; expert&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;2. Change user to root (admin password required!)&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;&lt;A href="mailto:admin@firepower"&gt;&lt;U&gt;&lt;FONT color="#0066cc"&gt;admin@firepower&lt;/FONT&gt;&lt;/U&gt;&lt;/A&gt;:/home/admin# sudo su -&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;3. Update mlocate file database&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;root@&lt;SPAN&gt;firepower&lt;/SPAN&gt;:/home/admin# updatedb&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;4. Search for file with name snort-unified.alert&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;root@&lt;SPAN&gt;firepower&lt;/SPAN&gt;:/home/admin# locate snort-unified.alert&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;5. Read file using more&lt;/P&gt;
&lt;P style="padding-left: 30px;"&gt;root@firepower:/home/admin# more &amp;lt;filepath_of_snort-unified.alert&amp;gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 29 Oct 2016 09:36:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cli-command-to-extract-ips-event-logs-from-firepower-sensor/m-p/2991919#M1018542</guid>
      <dc:creator>Oliver Kaiser</dc:creator>
      <dc:date>2016-10-29T09:36:46Z</dc:date>
    </item>
  </channel>
</rss>

