<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: R80.20 Identity Collector Syslog Parser in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Collector-Syslog-Parser/m-p/31426#M22786</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It looks&amp;nbsp;the configuration is based on regular expressions.&lt;/P&gt;&lt;P&gt;You'd have to work out what they are based on the specific log entries.&lt;/P&gt;&lt;P&gt;See:&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_IdentityAwareness_AdminGuide/159268.htm#o196736" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_IdentityAwareness_AdminGuide/159268.htm#o196736"&gt;Configuring Identity Collector&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 08 Feb 2019 20:26:47 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-02-08T20:26:47Z</dc:date>
    <item>
      <title>R80.20 Identity Collector Syslog Parser</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Collector-Syslog-Parser/m-p/31425#M22785</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;We are doing testing of R80.20 Identity Collector with Syslog Parser feature.&lt;/P&gt;&lt;P&gt;Is there any guide about how to create Syslog Parsers for Ruckus Zone Director (Version: 10.0.1.0 build 61) to get the identity information from login and logout event?&lt;BR /&gt;&lt;BR /&gt;Thank you&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Feb 2019 08:27:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Collector-Syslog-Parser/m-p/31425#M22785</guid>
      <dc:creator>Longson_Ho1</dc:creator>
      <dc:date>2019-02-08T08:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Collector Syslog Parser</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Collector-Syslog-Parser/m-p/31426#M22786</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It looks&amp;nbsp;the configuration is based on regular expressions.&lt;/P&gt;&lt;P&gt;You'd have to work out what they are based on the specific log entries.&lt;/P&gt;&lt;P&gt;See:&amp;nbsp;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_IdentityAwareness_AdminGuide/159268.htm#o196736" title="https://sc1.checkpoint.com/documents/R80.20_GA/WebAdminGuides/EN/CP_R80.20_IdentityAwareness_AdminGuide/159268.htm#o196736"&gt;Configuring Identity Collector&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 08 Feb 2019 20:26:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Collector-Syslog-Parser/m-p/31426#M22786</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-02-08T20:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Collector Syslog Parser</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Collector-Syslog-Parser/m-p/64874#M22787</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a basic problem in understanding the syslog parsing scenario: I can configure an Identity Source of type syslog requiring an IP address and a port number (514). But: Is this the address of my syslog server containing for example the login data of my RADIUS infrastructure? How can the Collector connect to the syslog server remotely over the standard syslog port to READ messages? So far I thought that syslog is a one way protocol only receiving messages from remote.&lt;/P&gt;&lt;P&gt;Or am I wrong and the Identity Controller will spawn a new syslog server instance on that IP/port and I have to redirect my syslog messages directly to the Identity Controller?&lt;/P&gt;&lt;P&gt;The documentation does not really say anything about setting up the syslog parsing scenario.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for clarifying and best regards,&lt;/P&gt;&lt;P&gt;Markus&lt;/P&gt;</description>
      <pubDate>Sat, 12 Oct 2019 13:01:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Collector-Syslog-Parser/m-p/64874#M22787</guid>
      <dc:creator>Markus_Hauke</dc:creator>
      <dc:date>2019-10-12T13:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: R80.20 Identity Collector Syslog Parser</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Collector-Syslog-Parser/m-p/67301#M22788</link>
      <description>&lt;P&gt;I have successfully created a syslog parser to pull the login and logoff messages from Cisco AnyConnect VPN sessions:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#Create a logging list on the Cisco ASA for the needed messages and send them to the IDC:&lt;/P&gt;&lt;P&gt;(config)# logging list MYLIST message 746012-746013&lt;/P&gt;&lt;P&gt;(config)# logging trap MYLIST&lt;/P&gt;&lt;P&gt;(config)# logging host inside [IP of server running the IDC]&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#IDC Parser:&lt;/P&gt;&lt;P&gt;I called it "CiscoACUserId" but the name can be anything you want.&lt;/P&gt;&lt;P&gt;##Logins:&lt;/P&gt;&lt;P&gt;Message Subject:&amp;nbsp;(.+Add\sIP)&amp;nbsp; **Check the box for Regex&lt;/P&gt;&lt;P&gt;Event Type: Login&lt;/P&gt;&lt;P&gt;Delimiter: :&lt;/P&gt;&lt;P&gt;Username Prefix:&amp;nbsp;\sLOCAL\\&lt;/P&gt;&lt;P&gt;Username: (\w+\.*\w*)&lt;/P&gt;&lt;P&gt;Address Prefix: User\smapping\s&lt;/P&gt;&lt;P&gt;Address: (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})&lt;/P&gt;&lt;P&gt;##Logouts:&lt;/P&gt;&lt;P&gt;Click the * (asterisk) to add another message&lt;/P&gt;&lt;P&gt;Message Subject:&amp;nbsp;(.+Delete\sIP)&amp;nbsp; **Check the box for Regex&lt;/P&gt;&lt;P&gt;Event Type: Logout&lt;/P&gt;&lt;P&gt;Delimiter: :&lt;/P&gt;&lt;P&gt;Username Prefix:&amp;nbsp;\sLOCAL\\&lt;/P&gt;&lt;P&gt;Username: (\w+\.*\w*)&lt;/P&gt;&lt;P&gt;Address Prefix: User\smapping\s&lt;/P&gt;&lt;P&gt;Address: (\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IDC1.png" style="width: 552px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3100i8686C4130716BE4B/image-size/large?v=v2&amp;amp;px=999" role="button" title="IDC1.png" alt="IDC1.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IDC2.png" style="width: 555px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/3101i492DF4487EB3A70D/image-size/large?v=v2&amp;amp;px=999" role="button" title="IDC2.png" alt="IDC2.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#IDC Identity Source:&lt;/P&gt;&lt;P&gt;Name: My Cisco ASA hostname&lt;/P&gt;&lt;P&gt;IP Address: My Cisco ASA IP address&lt;/P&gt;&lt;P&gt;Port: 514&lt;/P&gt;&lt;P&gt;Site: MySiteName where the ASA is located&lt;/P&gt;&lt;P&gt;Parser: CiscoACUserId (the one created above)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#Query Pools:&lt;/P&gt;&lt;P&gt;Edit your query pool and check the box for the new syslog Identity Source&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;#Filters:&lt;/P&gt;&lt;P&gt;If you're filtering things, be sure the IPs and/or usernames you expect to collect from the ASA are not filtered out. Otherwise nothing should be needed here.&lt;/P&gt;</description>
      <pubDate>Wed, 13 Nov 2019 16:24:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/R80-20-Identity-Collector-Syslog-Parser/m-p/67301#M22788</guid>
      <dc:creator>Jesse</dc:creator>
      <dc:date>2019-11-13T16:24:19Z</dc:date>
    </item>
  </channel>
</rss>

