<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cisco FMC IPS syslog configuration. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967118#M1106297</link>
    <description>&lt;P&gt;Intrusion policy-&amp;gt; advance setting-&amp;gt;external response&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do this in fmc and check log in syslog server&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 27 Nov 2023 21:53:04 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-11-27T21:53:04Z</dc:date>
    <item>
      <title>Cisco FMC IPS syslog configuration.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967102#M1106296</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;FMC 7.0.4, FTD 7.0.4.&lt;/P&gt;
&lt;P&gt;Can anyone tell me how to syslog the IPS, i havent been able to do it.&lt;/P&gt;
&lt;P&gt;the information i have found is:&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/external_alerting_for_intrusion_events.html#ID-2212-000001bf" target="_blank" rel="noopener"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/70/configuration/guide/fpmc-config-guide-v70/external_alerting_for_intrusion_events.html#ID-2212-000001bf&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;in the link the section&lt;/P&gt;
&lt;H2 id="ariaid-title7" class="title topictitle2"&gt;Configuring Syslog Alerting for Intrusion Events&lt;/H2&gt;
&lt;P&gt;the instruction on the link said this:&lt;/P&gt;
&lt;P&gt;The intrusion policy editor's navigation pane, click &lt;SPAN class="ph uicontrol"&gt;Advanced Settings&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P&gt;but i cant find that option can anybody show me how to do this and thanks for the help by the way.&lt;/P&gt;
&lt;P&gt;note:&lt;/P&gt;
&lt;P&gt;my user has the following privileges:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_0-1701120622412.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/203516i8E0F7745A659A630/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_0-1701120622412.png" alt="vivarock12_0-1701120622412.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;do i need the intrusion admin to?&lt;/P&gt;
&lt;P&gt;saludos,&lt;/P&gt;
&lt;P&gt;Gerardo Andree Mejia Garcia&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 21:36:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967102#M1106296</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2023-11-27T21:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC IPS syslog configuration.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967118#M1106297</link>
      <description>&lt;P&gt;Intrusion policy-&amp;gt; advance setting-&amp;gt;external response&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do this in fmc and check log in syslog server&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 21:53:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967118#M1106297</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-27T21:53:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC IPS syslog configuration.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967133#M1106300</link>
      <description>&lt;P&gt;Thanks for the help first finaly found the option, &lt;BR /&gt;but one question is it only posible to do it on SNORTv2 and not with V3, because i only saw the option on the V2.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_0-1701123059587.png" style="width: 898px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/203519i55DC495D00243048/image-dimensions/898x220?v=v2" width="898" height="220" role="button" title="vivarock12_0-1701123059587.png" alt="vivarock12_0-1701123059587.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_1-1701123181414.png" style="width: 857px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/203521iCCB0D6FC1383D57C/image-dimensions/857x395?v=v2" width="857" height="395" role="button" title="vivarock12_1-1701123181414.png" alt="vivarock12_1-1701123181414.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Saludos,&lt;/P&gt;
&lt;P&gt;Gerardo Andree Mejia Garcia&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 22:14:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967133#M1106300</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2023-11-27T22:14:02Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC IPS syslog configuration.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967134#M1106301</link>
      <description>&lt;P&gt;I will check this point.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 22:19:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967134#M1106301</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-27T22:19:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC IPS syslog configuration.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967154#M1106302</link>
      <description>&lt;P&gt;&lt;A href="https://community.cisco.com/t5/network-security/syslog-on-snort-3-intrusion-policy/td-p/4809383" target="_blank"&gt;https://community.cisco.com/t5/network-security/syslog-on-snort-3-intrusion-policy/td-p/4809383&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 00:05:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967154#M1106302</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-11-28T00:05:06Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC IPS syslog configuration.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967516#M1106326</link>
      <description>&lt;P&gt;thanks for the help going to double check that and ill tell you if its works.&lt;/P&gt;</description>
      <pubDate>Tue, 28 Nov 2023 14:32:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4967516#M1106326</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2023-11-28T14:32:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cisco FMC IPS syslog configuration.</title>
      <link>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4978197#M1106936</link>
      <description>&lt;P&gt;Besides the configuration we did previously in a case with cisco TAC we did the snort2 configuration to:&lt;/P&gt;
&lt;P&gt;we enter to the snortv2 configuration and enable the Syslog and the ip of the syslog server.&lt;/P&gt;
&lt;P&gt;heres all that is configured at the moment:&lt;/P&gt;
&lt;P&gt;Policies&amp;gt;Intrusion&amp;gt;you click on SNORT 2 version (for the rule you want to change):&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_5-1702575719694.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/205033iE9BFAE0E37335AEF/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_5-1702575719694.png" alt="vivarock12_5-1702575719694.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_0-1702575244642.png" style="width: 706px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/205028i00067A4053214F7B/image-dimensions/706x511?v=v2" width="706" height="511" role="button" title="vivarock12_0-1702575244642.png" alt="vivarock12_0-1702575244642.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_1-1702575274904.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/205029i708F9C51D9BBFA23/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_1-1702575274904.png" alt="vivarock12_1-1702575274904.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;The configuration on the ACP policy to (i think this migth be redundant but i didnt care all show you all the config):&lt;/P&gt;
&lt;P&gt;Policies&amp;gt;Access control&amp;gt;(the rule you want to change)&amp;gt;logging&amp;gt;IPS Settings (this migth be redundant)&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_3-1702575413411.png" style="width: 831px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/205031i3F46FF43551B8737/image-dimensions/831x966?v=v2" width="831" height="966" role="button" title="vivarock12_3-1702575413411.png" alt="vivarock12_3-1702575413411.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and on the platform setting for this FTD we change the severity(not sure but aparently this one is the one that made the IPS logs work)&lt;/P&gt;
&lt;P&gt;Device&amp;gt;plaform settings&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_4-1702575505611.png" style="width: 400px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/205032i5C100C8B05DD0159/image-size/medium?v=v2&amp;amp;px=400" role="button" title="vivarock12_4-1702575505611.png" alt="vivarock12_4-1702575505611.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;and on the platform setting we change the severity to informational,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IMPORTANT:&lt;BR /&gt;remember that the logs from IPS should be the ones with the code:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;430001: Intrusion event&lt;/P&gt;
&lt;P class="p"&gt;This ID was introduced in release 6.3.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/Syslogs/b_fptd_syslog_guide/security-event-syslog-messages.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/Syslogs/b_fptd_syslog_guide/security-event-syslog-messages.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="vivarock12_6-1702575907142.png" style="width: 809px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/205034i49704C332BFA701A/image-dimensions/809x791?v=v2" width="809" height="791" role="button" title="vivarock12_6-1702575907142.png" alt="vivarock12_6-1702575907142.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;this is the guide were i took that from.&lt;/P&gt;
&lt;P&gt;and this is how the LOG LOOKS LIKE:&lt;/P&gt;
&lt;DIV style="background-color: white !important;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="background-color: white !important;"&gt;&lt;SPAN&gt;this id the format the log has:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;P style="background-color: white !important; margin-top: 0px; margin-bottom: 0px;"&gt;&lt;SPAN&gt;&amp;lt;114&amp;gt;2023-12-12T16:55:49Z (this is a tag you can add on the syslog-object) IPS &amp;nbsp; %FTD-2-430001: DeviceUUID: asedfasdfasdfasdfasdfasdfasdfasdfasdasdf, InstanceID: 4, FirstPacketSecond: 2023-12-12T16:55:49Z, ConnectionID: 1290, SrcIP: 8.8.8.8, DstIP: 172.26.214.182, ICMPType: Echo Reply, ICMPCode: No Code, Protocol: icmp, IngressInterface: outside, EgressInterface: inside, IngressZone: FTD-OUTSIDE, EgressZone: FTD-INSIDE, Priority: 3, GID: 1, SID: 408, Revision: 8, Message: PROTOCOL-ICMP Echo Reply, Classification: Misc Activity, Client: ICMP client, ApplicationProtocol: ICMP, IntrusionPolicy: YOUR_IPS_POLICY, ACPolicy: YOUR_AControl_POLICY, AccessControlRuleName: ICMP_IPS_TEST, NAPPolicy: Balanced Security and Connectivity, InlineResult: Dropped, IngressVRF: Global, EgressVRF: Global&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background-color: white !important; margin-top: 0px; margin-bottom: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="background-color: white !important; margin-top: 0px; margin-bottom: 0px;"&gt;&lt;SPAN&gt;and for some reaseon the format is diferent from the other logs that come from the firewall:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background-color: white !important; margin-top: 0px; margin-bottom: 0px;"&gt;&lt;SPAN&gt;&amp;nbsp;Dec 12 2023 16:53:19 &amp;nbsp; %FTD-1-430003: EventPriority: Low, DeviceUUID: asedfasdfasdfasdfasdfasdfasdfasdfasdasdf, InstanceID: 4, FirstPacketSecond: 2023-12-12T16:53:19Z, ConnectionID: 57192, AccessControlRuleAction: Allow, SrcIP: 172.26.214.182, DstIP: 8.8.8.8, ICMPType: Echo Request, ICMPCode: No Code, Protocol: icmp, IngressInterface: inside, EgressInterface: outside, IngressZone: FTD-INSIDE, EgressZone: FTD-OUTSIDE, IngressVRF: Global, EgressVRF: Global, ACPolicy: YOUR_AControl_POLICY, AccessControlRuleName: ICMP_IPS_TEST, Prefilter Policy: Default Prefilter Policy, Client: ICMP client, ApplicationProtocol: ICMP, ConnectionDuration: 0, InitiatorPackets: 1, ResponderPackets: 1, InitiatorBytes: 74, ResponderBytes: 74, NAPPolicy: Balanced Security and Connectivity&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background-color: white !important; margin-top: 0px; margin-bottom: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="background-color: white !important; margin-top: 0px; margin-bottom: 0px;"&gt;&lt;SPAN&gt;but thats for the Syslog tool in case your have to do something else.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background-color: white !important; margin-top: 0px; margin-bottom: 0px;"&gt;&lt;SPAN&gt;thanks for the help &lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="background-color: white !important; margin-top: 0px; margin-bottom: 0px;"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Dec 2023 17:50:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-fmc-ips-syslog-configuration/m-p/4978197#M1106936</guid>
      <dc:creator>vivarock12</dc:creator>
      <dc:date>2023-12-14T17:50:53Z</dc:date>
    </item>
  </channel>
</rss>

