What i would like is to be able to use it like our current syslog server where i point the firewall device to securityonion (the mgmt interface?) for logging then when i search by class=BRO_SYSLOG the source and dest IPs will be the actual source and ip of the connection that the syslog message reported... NOT the source ip of the device that sent the syslog... is this possible? thanks!
i might also be having an issue with how to use elsa to search through the syslogs. If i send syslogs to the mgmt interface how would i search for syslogs coming from say device 192.168.0.1 (firewall) and i want to see any message (looking for accepts or denies) that references ip address 10.0.0.1 (host machine)?
ufw show that "514 ALLOW Anywhere"
Thanks!
"Host= 'ip address of firewall'" does select the device that is sending the syslogs but the only other parsed info is "program" and "class".
"Class" for both devices is 'NONE'.
"Program" for the PaloAlto is "1,'Date'" ex. "1,2014/07/18". for the ASA it is %asa-'somedigits' EX. "%asa-3-305012"
is this expected behavior?
Thanks.