<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sourcefire and Splunk in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Sourcefire-and-Splunk/m-p/79119#M16221</link>
    <description>&lt;P&gt;you can  collect intrusion events from the device directly as there is eStreamer server code on the device.  You'll only get IDS events however.  No impact flag.&lt;/P&gt;

&lt;P&gt;You can get IDS and Connection events off the device in syslog too.  TAC can help you set this up.&lt;/P&gt;

&lt;P&gt;On the port, you need to use 8302, not 8320.&lt;/P&gt;

&lt;P&gt;Doug&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jan 2018 16:11:36 GMT</pubDate>
    <dc:creator>douglashurd</dc:creator>
    <dc:date>2018-01-17T16:11:36Z</dc:date>
    <item>
      <title>Sourcefire and Splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Sourcefire-and-Splunk/m-p/79115#M16217</link>
      <description>&lt;P&gt;Is there a way to pull events into Splunk without Defense Center? We use one device in our organization and Defense Center seems a bit overkill for us. We use the web interface for configuration of our Sourcefire 3DS2000 Sensor. I enabled estreamer on the device, installed the Sourcefire for Splunk 2.0 app, set up a listener port on 8320, but I'm not seeing anything. It mentioned something about putting the SFPkcs12.pm cert in the correct directory. I put it in &lt;CODE&gt;C:\Program Files\Splunk\etc\apps\Sourcefire\bin&lt;/CODE&gt;&lt;/P&gt;

&lt;P&gt;Thanks for your help.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Jun 2012 00:23:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Sourcefire-and-Splunk/m-p/79115#M16217</guid>
      <dc:creator>MrWh1t3</dc:creator>
      <dc:date>2012-06-20T00:23:13Z</dc:date>
    </item>
    <item>
      <title>Re: Sourcefire and Splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Sourcefire-and-Splunk/m-p/79116#M16218</link>
      <description>&lt;P&gt;isn't estreamer port 8302?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Jun 2012 13:42:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Sourcefire-and-Splunk/m-p/79116#M16218</guid>
      <dc:creator>layzie88</dc:creator>
      <dc:date>2012-06-21T13:42:03Z</dc:date>
    </item>
    <item>
      <title>Re: Sourcefire and Splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Sourcefire-and-Splunk/m-p/79117#M16219</link>
      <description>&lt;P&gt;A new Splunk Firepower solution is now available if you are using Firepower version 6.x.  You can download the new eStreamer eNcore for Splunk and the separately installable dashboard from the two links below:&lt;/P&gt;

&lt;P&gt;eStreamer eNcore&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/3662/"&gt;https://splunkbase.splunk.com/app/3662/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;eNcore Dashboard&lt;BR /&gt;
&lt;A href="https://splunkbase.splunk.com/app/3663/"&gt;https://splunkbase.splunk.com/app/3663/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;It is free to use and well documented but if you would like to purchase a TAC Support service so that you can obtain installation and configuration assistance and troubleshooting you can order the software from Cisco (support obligatory with this purchase).  The Product Identifier is: FP-SPLUNK-SW-K9.&lt;/P&gt;

&lt;P&gt;Regardless of whether you take up the support option or not, updated versions will be made available to all free of charge and posted on Splunkbase as well as Cisco Downloads.&lt;/P&gt;</description>
      <pubDate>Wed, 02 Aug 2017 23:18:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Sourcefire-and-Splunk/m-p/79117#M16219</guid>
      <dc:creator>douglashurd</dc:creator>
      <dc:date>2017-08-02T23:18:20Z</dc:date>
    </item>
    <item>
      <title>Re: Sourcefire and Splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Sourcefire-and-Splunk/m-p/79118#M16220</link>
      <description>&lt;P&gt;Documentation has some errors and needs a few points of clarification.&lt;/P&gt;

&lt;P&gt;Example.  There is reference to changing the Port for the app, but nothing about how to change the port on Firepower to account for the change.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2018 13:28:53 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Sourcefire-and-Splunk/m-p/79118#M16220</guid>
      <dc:creator>bworrellZP</dc:creator>
      <dc:date>2018-01-17T13:28:53Z</dc:date>
    </item>
    <item>
      <title>Re: Sourcefire and Splunk</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Sourcefire-and-Splunk/m-p/79119#M16221</link>
      <description>&lt;P&gt;you can  collect intrusion events from the device directly as there is eStreamer server code on the device.  You'll only get IDS events however.  No impact flag.&lt;/P&gt;

&lt;P&gt;You can get IDS and Connection events off the device in syslog too.  TAC can help you set this up.&lt;/P&gt;

&lt;P&gt;On the port, you need to use 8302, not 8320.&lt;/P&gt;

&lt;P&gt;Doug&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jan 2018 16:11:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Sourcefire-and-Splunk/m-p/79119#M16221</guid>
      <dc:creator>douglashurd</dc:creator>
      <dc:date>2018-01-17T16:11:36Z</dc:date>
    </item>
  </channel>
</rss>

