Steps to add CISCO ISR 4331 Network Device into wazuh
329 views
Skip to first unread message
Sushant Pansare
unread,
Jan 2, 2025, 1:20:34 AM1/2/25
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Hello Team,
We have setup a test environment of Wazuh using OVA setup; our aim is to first confirm compatibility of this solution with our devices.
We have added 2 Windows servers and now want to add our Cisco ISR router to send logs to Wazuh.
PL provide detailed steps from start to end.
Message has been deleted
hasitha.u...@wazuh.com
unread,
Jan 2, 2025, 2:04:30 AM1/2/25
Reply to author
Sign in to reply to author
Forward
Sign in to forward
Delete
You do not have permission to delete messages in this group
Copy link
Report message
Show original message
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to Wazuh | Mailing List
Hi @Sushant,
Wazuh can receive logs from agentless devices by configuring syslog.
Alternatively, you can install Wazuh agent for a Linux device and then you can config rsyslog over there and then you can collect logs from a log file.
If you want to collect logs from first option, you can directly receive logs to Wazuh-manager. First option: Add the following configuration in between the <ossec_config> tags of the Wazuh server /var/ossec/etc/ossec.conf file to listen for syslog messages on TCP port 514:
Once you configured the syslog on ossec.conf you can verify logs reaching manager, by enable the archive log. For that you can enable the archive log by editing the /var/ossec/etc/ossec.conf file.
<ossec_config>
<global>
----
<logall>no</logall>
<logall_json>yes</logall_json>
-----
</global>
-----
</ossec_config>
And then check if you receive logs from
Cisco ISR router. cat /var/ossec/logs/archives/archives.json | grep -i -E "<part of your router log>"