Hello milan.patel, hope you’re great.
Yes, you could configure your CISCO devices to send logs to your Wazuh manager. Then, you can collect them and obtain the alerts.
To receive data from your devices you should add a configuration block similar to this one in your ossec.conf (manager side):
<remote> <connection>syslog</connection> <port>514</port> <protocol>tcp</protocol> <allowed-ips>192.168.0.0/24</allowed-ips> <local_ip>192.168.0.1</local_ip> </remote>More details about this feature here.
Yes, you can do agentless monitoring. You could filter by the rule group pfsense (check it here), if you are your custom decoders/rules for extra cases or something you can add them to that group. Also, about the orchestration, you can use active responses to handle those malicious IPs. Besides, here you have relevant info
Did you try to use the /var/ossec/bin/wazuh-logtest tool to verify that those logs that your manager receives have the expected format and trigger the alerts? Besides, I see this is a duplicate of this one.
Hope this helps you,
Luis.
I’m sorry, the configuration sample formatting was messed up. Hope this one is not.
Also, here you have more samples.