The following content pack is available for use with a Graylog Illuminate license and Graylog Enterprise or Graylog Security. Contact sales to learn more about obtaining Illuminate.

Cisco Business 350 Series Managed Switches are managed Layer 3 network switches designed for small and medium-sized businesses, offering advanced features like VLAN segmentation, static routing, and enhanced security in a simple, intuitive interface.

This technology pack processes Cisco Business 350 Series (CBS) switch logs, providing normalization and enrichment of common events of interest.

Supported Version(s)

  • Pack created with CBS350 Firmware 3.4.0.17

Requirements

  • Minimum supported version of Graylog.

  • Configure CBS350 device to transmit RFC5424 formatted Syslog to your Graylog server Syslog input.

Hint: Cisco legacy formatted logs are not currently supported, e.g. <190>%COPY-I-FILECPY....

Stream Configuration

This technology pack includes 1 stream:

  • "Illuminate:Cisco Device Messages"

Hint: If this stream does not exist prior to the activation of this pack then it will be created and configured to route messages to this stream and the associated index set. There should not be any stream rules configured for this stream.

Index Set Configuration

This technology pack includes 1 index set definition:

  • Cisco Devices Event Log Messages

Hint: If this index set is already defined, then nothing will be changed. If this index set does not exist, then it will be created with retention settings of a daily rotation and 90 days of retention. These settings can be adjusted as required after installation.

Hint: This pack utilizes the general Illuminate Cisco Devices Event Log Messages index that most other Cisco related content packs use. If you have an existing Cisco Devices Event Log Messages index, the CBS logs will reside there.

Log Collection and Delivery

This pack parses logs from the following sources:

  • Syslog

Configuration

Due to the generic formatting of CBS logs, identifying and parsing these logs can be difficult and

possibly match non-CBS logs. To solve this problem, you must configure a CBS-specific input on the Graylog server and use an Illuminate lookup override. This configuration allows Illuminate to treat every log sent to this input as a CBS message by mapping the input ID to the CBS Illuminate identification rule. This input should be unique to CBS to ensure this pack processes only CBS logs.

  1. Create a new Syslog input in Graylog and choose an unused port.

  2. Click Show received messages to obtain the input ID. This action pulls up a search window with the All Time timeframe.

  3. Copy the gl2_source_input value.

  4. Navigate to Enterprise > Illuminate, then click the Customization tab.

  5. Locate the lookup_adapter_input_routing title and click Edit.

  6. For Key: content_name, enter cisco_350, and for the Value: input_id, enter the gl2_source_input ID copied earlier.

  7. Click Configure value to confirm. Graylog identifies all logs sent to the configured input and associated port as CBS logs, allowing for proper Illuminate processing.

  8. Create Illuminate lookup override.

Log Format Example

These are example logs for various processed log types.

<190>1 2025-01-24T11:09:44.000-08:00 SOME-SWITCH SOMETHING - CONNECT - User CLI session for user some.user over ssh , source 192.168.2.3 destination 192.168.2.10 ACCEPTED <190>1 2025-01-24T11:48:30.000-08:00 SOME-SWITCH SOMETHING - SSHSUCC - Connection ID 11 - SSH Session request from 192.168.2.10 port 53865 to Local address 192.168.2.30 port 22, username 'some.user' using crypto cipher aes256-ctr, hmac hmac-sha2-256 succeeded. <190>1 2025-01-17T09:27:51.000-08:00 SOME-SWITCh SOMETHING - Up - gi1/0/47 <190>1 2025-02-25T00:04:48.000-08:00 SOME-SWITCh SOMETHING - FILECPY - Files Copy - source URL flash://system/configuration/startup-config destination URL flash://system/configuration/mirror-config

What is Provided

  • Rules to parse, normalize, and enrich Content Pack messages.

Events Processed by This Technology Pack

The content pack supports the following log types. Generic processing will be provided for log types not listed.

  • NATIVE_VLAN_MISMATCH

  • PORTSTATUS

  • SECSYNBLOCKED

  • SNMPAUTHFAIL

  • SSHFAIL

  • LOG

  • FILECPY

  • REJECT

  • Up

  • Down

  • SHUTDWN

  • SSHSUCC

  • CONNECT

  • DISCONNECT

  • EeeLldpMultiNeighbours

Message Fields Included in This Pack

General Parsing

Common Fields List

Field Name Example Value Field Type Description
application_name PNPAGENT keyword This field is generated by the Syslog input when analyzing the syslog message
destination_ip 192.168.2.10 long IP address of the destination host
destination_port 22 long Port the client connects to
event_source GL-SWITCH keyword Syslog hostname in delivered message
event_source_product cisco_350 keyword The default event_source_product for CBS processed logs
network_interface gi1/0/47 keyword The network interface(s) noted in the message
source_ip 192.168.2.3 long IP address of the source host
source_port 12345 long Port from which the client initiates
user_name some.user keyword User name tied to the message
vendor_crypto_cipher aes256-ctr keyword The cypher used to encrypt the communication
vendor_crypto_hmac hmac-sha2-256 keyword The HMAC used in the communication
vendor_connection_id 14 keyword The connection ID associated with the connection
vendor_destination_file_name mirror-config keyword The destination file name noted in message
vendor_destination_protocol flash keyword The destination protocol noted in the message (flash/http/https/etc.)
vendor_destination_request_path /system/configuration/mirror-config keyword The destination file path
vendor_event_message Backoff PnP Request with <callbackAfter> has received: 24 Hours 0 Minutes 0 Seconds keyword Main event message contained in log and will only exist for log types not noted as supported
vendor_event_outcome Bye Bye keyword The outcome from the associated connection
vendor_event_outcome_code 11 keyword The outcome code from the associated connection
vendor_event_outcome_reason identification exchange failed keyword Additionally provided info related to the outcome of the associated connection
vendor_source_request_path /system/configuration/startup-config keyword The source file path
vendor_source_request_protocol flash keyword The source protocol noted in the message (flash/http/https/etc.)
vendor_subtype BACKOFFCALLBACKAFTER keyword This field is extracted is the CBS message ID or event identifier