<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Collecting FMC Logs Including User-Requested URLs Through Syslog in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5244175#M1118591</link>
    <description>&lt;P&gt;When we setup an Access Control Policy rule to send syslog events, it is the managed FTD device actually sending its view of the traffic the the syslog server. That is why we only see a subset of what you can see in FMC itself. The FMC view is enriched by context it retrieves from other sources such as Identity from ISE, URL from analysis of the packets, etc. That enriched set of information is not directly exportable to a syslog server from FMC.&lt;/P&gt;
&lt;P&gt;Here you can see what an FTD device sends to syslog in the case of a DNS lookup - that is the only time we see the FQDN from a syslog event since it is part of the event. Subsequent connections (and any syslog event associated with them) will just use the IP address and that is what will be seen in a syslog event for that traffic.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;  %FTD-6-430003: EventPriority: Low, DeviceUUID: f35fbf2c-a28c-11ef-8f3e-91c8635f9d10, InstanceID: 1, FirstPacketSecond: 2025-01-07T03:16:18Z, ConnectionID: 538, AccessControlRuleAction: Allow, SrcIP: 172.31.1.31, DstIP: 8.8.8.8, SrcPort: 58951, DstPort: 53, Protocol: udp, IngressInterface: Inside-Lab, EgressInterface: Outside-Home, IngressZone: inside, EgressZone: outside, IngressVRF: Global, EgressVRF: Global, ACPolicy: Lab_ACP, AccessControlRuleName: Lab-Outside, Prefilter Policy: Default Prefilter Policy, Client: DNS, ApplicationProtocol: DNS, ConnectionDuration: 0, InitiatorPackets: 1, ResponderPackets: 1, InitiatorBytes: 120, ResponderBytes: 248, NAPPolicy: Balanced Security and Connectivity, DNSQuery: dt-external-217593033.us-east-1.elb.amazonaws.com, DNSRecordType: a host address, DNSResponseType: No Error, DNS_TTL: 37, ReferencedHost: dt-external-217593033.us-east-1.elb.amazonaws.com, NAT_InitiatorPort: 58951, NAT_ResponderPort: 53, NAT_InitiatorIP: 192.168.0.204, NAT_ResponderIP: 8.8.8.8, ClientAppDetector: AppID, InspectedPacketCount: 2, InspectionMicroseconds: 558
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 07 Jan 2025 03:24:51 GMT</pubDate>
    <dc:creator>Marvin Rhoads</dc:creator>
    <dc:date>2025-01-07T03:24:51Z</dc:date>
    <item>
      <title>Collecting FMC Logs Including User-Requested URLs Through Syslog</title>
      <link>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5243288#M1118574</link>
      <description>&lt;P&gt;I am currently using Cisco Firepower Management Center (FMC) and would like to collect logs that include detailed information about users' requested URLs and send them to a central syslog server for analysis.&lt;/P&gt;&lt;P&gt;Here are my specific requirements and questions:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;STRONG&gt;Log Details&lt;/STRONG&gt;: How can I configure FMC to include details such as requested URLs, timestamps, and the action taken (e.g., allowed or blocked) in the syslog messages?&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Syslog Configuration&lt;/STRONG&gt;: What are the necessary steps to set up FMC to forward these logs to a syslog server?&lt;UL&gt;&lt;LI&gt;Is there a specific syslog facility or severity level recommended for URL-related logs?&lt;/LI&gt;&lt;LI&gt;Do I need to configure any specific policies or logging profiles in FMC for this?&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;User Identity Information&lt;/STRONG&gt;: How can I ensure that FMC logs include user identity information (e.g., usernames) along with URL requests?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Any guidance, including examples of syslog configurations, FMC policies, or integration tips, would be greatly appreciated.&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jan 2025 11:17:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5243288#M1118574</guid>
      <dc:creator>waheh91451</dc:creator>
      <dc:date>2025-01-04T11:17:14Z</dc:date>
    </item>
    <item>
      <title>Re: Collecting FMC Logs Including User-Requested URLs Through Syslog</title>
      <link>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5243308#M1118576</link>
      <description>&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/td/docs/security/firepower/splunk/Cisco_Firepower_App_for_Splunk_User_Guide.html" target="_blank"&gt;https://www.cisco.com/c/en/us/td/docs/security/firepower/splunk/Cisco_Firepower_App_for_Splunk_User_Guide.html&lt;/A&gt;&amp;nbsp;&amp;lt;&amp;lt;- check this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sat, 04 Jan 2025 13:12:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5243308#M1118576</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-01-04T13:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: Collecting FMC Logs Including User-Requested URLs Through Syslog</title>
      <link>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5243799#M1118584</link>
      <description>&lt;P&gt;Hi there, thanks for replying, I think you got it wrong, the problem isn't about parsing logs, the problem is that my raw logs doesn't include any URL field.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jan 2025 04:54:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5243799#M1118584</guid>
      <dc:creator>waheh91451</dc:creator>
      <dc:date>2025-01-06T04:54:35Z</dc:date>
    </item>
    <item>
      <title>Re: Collecting FMC Logs Including User-Requested URLs Through Syslog</title>
      <link>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5244175#M1118591</link>
      <description>&lt;P&gt;When we setup an Access Control Policy rule to send syslog events, it is the managed FTD device actually sending its view of the traffic the the syslog server. That is why we only see a subset of what you can see in FMC itself. The FMC view is enriched by context it retrieves from other sources such as Identity from ISE, URL from analysis of the packets, etc. That enriched set of information is not directly exportable to a syslog server from FMC.&lt;/P&gt;
&lt;P&gt;Here you can see what an FTD device sends to syslog in the case of a DNS lookup - that is the only time we see the FQDN from a syslog event since it is part of the event. Subsequent connections (and any syslog event associated with them) will just use the IP address and that is what will be seen in a syslog event for that traffic.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;  %FTD-6-430003: EventPriority: Low, DeviceUUID: f35fbf2c-a28c-11ef-8f3e-91c8635f9d10, InstanceID: 1, FirstPacketSecond: 2025-01-07T03:16:18Z, ConnectionID: 538, AccessControlRuleAction: Allow, SrcIP: 172.31.1.31, DstIP: 8.8.8.8, SrcPort: 58951, DstPort: 53, Protocol: udp, IngressInterface: Inside-Lab, EgressInterface: Outside-Home, IngressZone: inside, EgressZone: outside, IngressVRF: Global, EgressVRF: Global, ACPolicy: Lab_ACP, AccessControlRuleName: Lab-Outside, Prefilter Policy: Default Prefilter Policy, Client: DNS, ApplicationProtocol: DNS, ConnectionDuration: 0, InitiatorPackets: 1, ResponderPackets: 1, InitiatorBytes: 120, ResponderBytes: 248, NAPPolicy: Balanced Security and Connectivity, DNSQuery: dt-external-217593033.us-east-1.elb.amazonaws.com, DNSRecordType: a host address, DNSResponseType: No Error, DNS_TTL: 37, ReferencedHost: dt-external-217593033.us-east-1.elb.amazonaws.com, NAT_InitiatorPort: 58951, NAT_ResponderPort: 53, NAT_InitiatorIP: 192.168.0.204, NAT_ResponderIP: 8.8.8.8, ClientAppDetector: AppID, InspectedPacketCount: 2, InspectionMicroseconds: 558
&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jan 2025 03:24:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5244175#M1118591</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-01-07T03:24:51Z</dc:date>
    </item>
    <item>
      <title>Re: Collecting FMC Logs Including User-Requested URLs Through Syslog</title>
      <link>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5244709#M1118626</link>
      <description>&lt;P&gt;Thanks for your clarification, Is there anyway to config FTD to include FQDN in syslog output?&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 10:12:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5244709#M1118626</guid>
      <dc:creator>waheh91451</dc:creator>
      <dc:date>2025-01-08T10:12:03Z</dc:date>
    </item>
    <item>
      <title>Re: Collecting FMC Logs Including User-Requested URLs Through Syslog</title>
      <link>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5244765#M1118629</link>
      <description>&lt;P&gt;No, not to the best of my knowledge.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2025 12:51:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/collecting-fmc-logs-including-user-requested-urls-through-syslog/m-p/5244765#M1118629</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2025-01-08T12:51:58Z</dc:date>
    </item>
  </channel>
</rss>

