Replies: 1 comment 8 replies
-
You can move them to |
Beta Was this translation helpful? Give feedback.
8 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Version
2.4.141
Installation Method
Security Onion ISO image
Description
other (please provide detail below)
Installation Type
Standalone
Location
on-prem with Internet access
Hardware Specs
Meets minimum requirements
CPU
4
RAM
64GB
Storage for /
128GB
Storage for /nsm
3TB
Network Traffic Collection
other (please provide detail below)
Network Traffic Speeds
Less than 1Gbps
Status
Yes, all services on all nodes are running OK
Salt Status
No, there are no failures
Logs
No, there are no additional clues
Detail
Good afternoon all,
A few weeks back, I spun up a SecurityOnion (SO) standalone instance on an older Dell PowerEdge I had. The installation and configuration occurred with no issues. As I began to understand the tool more, I tried installing and configuring different integrations for testing and better visibility. One of them being the Cisco IOS integration.
I have an older Cisco WS-C3850-48P and I wanted to sends its logs into SO for retention and review. Its IP address is
192.168.1.2
and my security onions IP address is192.168.0.121
. From my switch I am able to ping my SO server and vice-versa.I downloaded, installed and configured the Cisco IOS integration and deployed it to my standalone nodes policy (

so-grid-nodes_general
). I have it configured to listen on port9002
via UDP and on interface0.0.0.0
. You can view the integration config in the attached screenshot to confirm.I have my Cisco switch configured to send syslogs via UDP on port
9002
and to the SO server (192.168.0.121
). You can see its configuration below -I did not include the log buffer since it has a bunch of test messages I sent.
If my understanding of the config on both sides is correct, I should be seeing some syslogs from my switch in SO. However, when I search in Kibana and look in the dashboard I do not see anything. I tried searching for answers and found a similar thread here #12055 but the answer is not super clear to me. But running the commands outlined in that post, I find similar results -
Then
iptables
which does not look like it is working -Then I tried the
tcpdump
option to see if packets are actually flowing to the interface. I tried sending more syslogs and those do not appear in thetcpdump
, but when I tried pinging from the switch, I saw that traffic reflected in thetcpdump
. You can see the output here -So there definitely is some network connectivity but I'm not sure why the syslogs are not showing up.
Next I tried following the documentation in the discussion (it is for PFSense so slightly different) - https://docs.securityonion.net/en/2.4/pfsense.html#elastic-integration-for-pfsense and in another similar discussion #12152
In the SOC webUI I selected

Admin
->Configuration
->Firewall
->Hostgroups
->syslog
and then added the range of IP addresses for my home network. You can see the config in the screenshot below -So I'm at a bit of a loss of what I should try next, or if someone might be able to help me understand what I am doing wrong. Any help would be appreciated.
Update - 2025/06/17 5:41PM EST:
To add a bit more info, I did try running a different
tcpdump
command and I was able to see the syslogs reaching the SO interface -Guidelines
Beta Was this translation helpful? Give feedback.
All reactions