<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322735#M93014</link>
    <description>&lt;P&gt;If your problem is resolved, please accept one of the answers (perhaps your own) to help future searchers.&lt;/P&gt;</description>
    <pubDate>Thu, 20 Apr 2017 13:45:42 GMT</pubDate>
    <dc:creator>richgalloway</dc:creator>
    <dc:date>2017-04-20T13:45:42Z</dc:date>
    <item>
      <title>How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322717#M92996</link>
      <description>&lt;P&gt;Hi Guys, &lt;/P&gt;

&lt;P&gt;I've been trying to send Cisco ASA firewall logs to syslog-ng server where the forwarder is installed but I just can't get it working. &lt;/P&gt;

&lt;P&gt;I've setup a forwarder and installed syslog-ng in Ubuntu VM.  &lt;/P&gt;

&lt;P&gt;I have tried to follow the instructions on this link and also from other various sources but I'm stressful enough to say that I just can't get it working. &lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.splunk.com/blog/2016/03/11/using-syslog-ng-with-splunk/" target="_blank"&gt;https://www.splunk.com/blog/2016/03/11/using-syslog-ng-with-splunk/&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;I really need some clear detailed step by step instructions on how to configure Cisco ASA to store syslogs into the syslog-ng server and forward the data to indexer. &lt;/P&gt;

&lt;P&gt;I'm not sure if I configured syslog-ng server properly in Ubuntu. I used following tutorial but no success. &lt;/P&gt;

&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=glvsJJFbzZc&amp;amp;feature=em-share_video_user" target="_blank"&gt;https://www.youtube.com/watch?v=glvsJJFbzZc&amp;amp;feature=em-share_video_user&lt;/A&gt;&lt;/P&gt;

&lt;P&gt;Could you check if everything looks ok below and advise the next step from here? &lt;/P&gt;

&lt;P&gt;My goal is to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder so that I'm able to see all the cisco asa logs from the search. &lt;/P&gt;

&lt;P&gt;My setup is as below: All servers have been built with Ubuntu in VM. &lt;/P&gt;

&lt;P&gt;Indexer: 10.10.50.11&lt;BR /&gt;
Forwarder: 10.10.50.12 (Installed syslog-ng here)&lt;/P&gt;

&lt;P&gt;I can ping and SSH between Indexer and forwarder. &lt;/P&gt;

&lt;P&gt;Configured universal forwarder to send data to the receiving indexer. &lt;BR /&gt;
root@forwarder:/opt/splunkforwarder/bin# ./splunk add forward-server 10.10.50.11:9997 -auth admin:seeshock&lt;BR /&gt;
&amp;nbsp;root@forwarder:/opt/splunkforwarder/bin# ./splunk list forward-server&lt;BR /&gt;
Active forwards:&lt;BR /&gt;
None&lt;BR /&gt;
Configured but inactive forwards:&lt;BR /&gt;
10.10.50.11:9997&lt;/P&gt;

&lt;P&gt;Configure deployment client&lt;BR /&gt;
root@forwarder:/opt/splunkforwarder/bin# ./splunk show deploy-poll&lt;BR /&gt;
Deployment Server URI is set to "10.10.50.12:8089".&lt;/P&gt;

&lt;P&gt;root@indexer:/opt/splunk/bin# ./splunk status&lt;BR /&gt;
splunkd is running (PID: 3109).&lt;BR /&gt;
splunk helpers are running (PIDs: 3110 3118 3183 3200).&lt;BR /&gt;
&amp;nbsp;&lt;/P&gt;

&lt;P&gt;root@indexer:/opt/splunk/bin# ./splunk btool inputs list splunktcp --debug | grep -v default&lt;BR /&gt;
/opt/splunk/etc/system/local/inputs.conf host = indexer&lt;BR /&gt;
/opt/splunk/etc/apps/launcher/local/inputs.conf [splunktcp://9997]&lt;BR /&gt;
/opt/splunk/etc/apps/launcher/local/inputs.conf connection_host = ip&lt;BR /&gt;
/opt/splunk/etc/system/local/inputs.conf host = indexer&lt;BR /&gt;
&amp;nbsp;&lt;/P&gt;

&lt;P&gt;root@indexer:/opt/splunk/bin# ./splunk list inputstatus&lt;BR /&gt;
tcp_cooked:listenerports :&lt;BR /&gt;
9997&lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
index=&lt;EM&gt;internal host="indexer" &lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
Time    Event&lt;BR /&gt;&lt;BR /&gt;
    4/2/17  10.10.50.11 - admin [02/Apr/2017:20:47:25.825 +1000] "GET /en-US/splunkd/&lt;/EM&gt;&lt;EM&gt;raw/services/search/shelper?output_mode=json&amp;amp;snippet=true&amp;amp;snippetEmbedJS=false&amp;amp;namespace=search&amp;amp;search=search+index%3D_internal+host%3D&amp;amp;useTypeahead=true&amp;amp;useAssistant=false&amp;amp;showCommandHelp=true&amp;amp;showCommandHistory=true&amp;amp;showFieldInfo=false&amp;amp;&lt;/EM&gt;=1491126297345 HTTP/1.1" 200 5141 "&lt;A href="http://10.10.50.11:8000/en-US/app/search/search?q=search%20index%3D_internal%20host%3Dforwarder&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=&amp;amp;latest=&amp;amp;sid=1491130033.479" target="_blank"&gt;http://10.10.50.11:8000/en-US/app/search/search?q=search%20index%3D_internal%20host%3Dforwarder&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=&amp;amp;latest=&amp;amp;sid=1491130033.479&lt;/A&gt;" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:51.0) Gecko/20100101 Firefox/51.0" - b44fb5fd27b3677a2443d6de473370fe 8ms&lt;BR /&gt;
    8:47:25.825 PM  · host = indexer &lt;BR /&gt;
        · source = /opt/splunk/var/log/splunk/splunkd_ui_access.log &lt;BR /&gt;
        · sourcetype = splunkd_ui_access &lt;BR /&gt;
    4/2/17  10.10.50.11 - admin [02/Apr/2017:20:47:25.681 +1000] "GET /en-US/splunkd/_&lt;EM&gt;raw/services/search/shelper?output_mode=json&amp;amp;snippet=true&amp;amp;snippetEmbedJS=false&amp;amp;namespace=search&amp;amp;search=search+index%3D_internal+host%3Df&amp;amp;useTypeahead=true&amp;amp;useAssistant=false&amp;amp;showCommandHelp=true&amp;amp;showCommandHistory=true&amp;amp;showFieldInfo=false&amp;amp;&lt;/EM&gt;=1491126297344 HTTP/1.1" 200 5109 "&lt;A href="http://10.10.50.11:8000/en-US/app/search/search?q=search%20index%3D_internal%20host%3Dforwarder&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=&amp;amp;latest=&amp;amp;sid=1491130033.479" target="_blank"&gt;http://10.10.50.11:8000/en-US/app/search/search?q=search%20index%3D_internal%20host%3Dforwarder&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;earliest=&amp;amp;latest=&amp;amp;sid=1491130033.479&lt;/A&gt;" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:51.0) Gecko/20100101 Firefox/51.0" - b44fb5fd27b3677a2443d6de473370fe 40ms&lt;BR /&gt;
    8:47:25.681 PM  · host = indexer &lt;BR /&gt;
        · source = /opt/splunk/var/log/splunk/splunkd_ui_access.log &lt;BR /&gt;
        · sourcetype = splunkd_ui_access &lt;/P&gt;

&lt;P&gt;&amp;nbsp;&lt;/P&gt;

&lt;P&gt;index=_internal host="forwarder" &lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
4/3/17  04-03-2017 14:15:24.393 +1000 INFO DC:PhonehomeThread - Attempted handshake 260 times. Will try to re-subscribe to handshake reply&lt;BR /&gt;&lt;BR /&gt;
2:15:24.393 PM  · host = forwarder &lt;BR /&gt;
    · source = /opt/splunkforwarder/var/log/splunk/splunkd.log &lt;BR /&gt;
    · sourcetype = splunkd &lt;BR /&gt;
    4/3/17  04-03-2017 14:15:24.393 +1000 INFO DC:DeploymentClient - channel=tenantService/handshake Will retry sending handshake message to DS; err=not_connected&lt;BR /&gt;
    2:15:24.393 PM  · host = forwarder &lt;BR /&gt;
        · source = /opt/splunkforwarder/var/log/splunk/splunkd.log &lt;BR /&gt;
        · sourcetype = splunkd &lt;BR /&gt;
    4/3/17  04-03-2017 14:15:16.083 +1000 INFO Metrics - group=thruput, name=uncooked_output, instantaneous_kbps=0.000000, instantaneous_eps=0.000000, average_kbps=0.000000, total_k_processed=0.000000, kb=0.000000, ev=0.000000&lt;BR /&gt;
    2:15:16.083 PM  · host = forwarder &lt;BR /&gt;
        · source = /opt/splunkforwarder/var/log/splunk/metrics.log &lt;BR /&gt;
        · sourcetype = splunkd &lt;/P&gt;

&lt;P&gt;&amp;nbsp;&lt;BR /&gt;
&amp;nbsp;&lt;/P&gt;

&lt;P&gt;&amp;nbsp;&lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
root@indexer:/etc/syslog-ng# netstat -an | grep 9997&lt;BR /&gt;
tcp 0 0 0.0.0.0:9997 0.0.0.0:* LISTEN &lt;BR /&gt;
tcp 0 0 10.10.50.11:9997 10.10.50.12:53380 ESTABLISHED&lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
&amp;nbsp;&lt;/P&gt;

&lt;P&gt;&amp;nbsp;&lt;BR /&gt;
root@indexer:/opt/splunk/etc/system/local# mkdir firewall_asa&lt;/P&gt;

&lt;P&gt;root@indexer:/opt/splunk/etc/system/local# cd firewall_asa&lt;/P&gt;

&lt;P&gt;root@indexer:/opt/splunk/etc/system/local/firewall_asa# cd&lt;/P&gt;

&lt;P&gt;root@indexer:~# cd /opt/splunk/bin&lt;/P&gt;

&lt;P&gt;root@indexer:/opt/splunk/bin# ./splunk add udp 514 -sourcetype cisco:asa&lt;BR /&gt;
Listening for UDP input on port 514.&lt;BR /&gt;
&amp;nbsp;&lt;/P&gt;

&lt;P&gt;root@forwarder:/opt/splunkforwarder/bin# ./splunk show deploy-poll&lt;BR /&gt;
Deployment Server URI is set to "10.10.50.12:8089".&lt;/P&gt;

&lt;P&gt;root@forwarder:/opt/splunkforwarder/bin# ./splunk list forward-server&lt;BR /&gt;
Active forwards:&lt;BR /&gt;
10.10.50.11:9997&lt;BR /&gt;
Configured but inactive forwards:&lt;BR /&gt;
None&lt;/P&gt;

&lt;P&gt;root@forwarder:/opt/splunkforwarder/bin# ./splunk show servername&lt;BR /&gt;
Server name: forwarder&lt;/P&gt;

&lt;P&gt;root@forwarder:/opt/splunkforwarder/bin# ./splunk show default-hostname&lt;BR /&gt;
Default hostname for data inputs: forwarder.&lt;/P&gt;

&lt;P&gt;root@forwarder:/opt/splunkforwarder/bin# ./splunk show servername&lt;BR /&gt;
Server name: forwarder&lt;/P&gt;

&lt;P&gt;root@forwarder:/opt/splunkforwarder/bin# ./splunk show default-hostname&lt;BR /&gt;
Default hostname for data inputs: forwarder.&lt;/P&gt;

&lt;P&gt;root@forwarder:/opt/splunkforwarder/bin# ./splunk add forward-server 10.10.50.11:9997 -auth admin:seeshock&lt;BR /&gt;
Added forwarding to: 10.10.50.11:9997.&lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
root@forwarder:/opt/splunkforwarder/bin# ./splunk list forward-server&lt;BR /&gt;
Active forwards:&lt;BR /&gt;
None&lt;BR /&gt;
Configured but inactive forwards:&lt;BR /&gt;
10.10.50.11:9997&lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:37:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322717#M92996</guid>
      <dc:creator>jhl226116</dc:creator>
      <dc:date>2020-09-29T13:37:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322718#M92997</link>
      <description>&lt;P&gt;One solution to this would be to on the syslog-ng server utilize buckets.d and patterdb.d in order to write the cisco ASA logs to a directory and then from there, you can use a UF to monitor that directory and forward directly to the indexers.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2017 12:41:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322718#M92997</guid>
      <dc:creator>bmo017</dc:creator>
      <dc:date>2017-04-12T12:41:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322719#M92998</link>
      <description>&lt;P&gt;Try this:&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt; Run traceroute on your ubu box to first determine if you are getting data from your ASA:&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;tcpdump -vvv -i  src host  and udp port 514&lt;BR /&gt;
or &lt;BR /&gt;
 tcpdump -vvv -i  src host  and tcp port 514&lt;/P&gt;

&lt;P&gt;Assuming you see data, then move on to the next steps, else you are either not sending logs from your ASA, you have a routing issue (which I doubt as you are able to ping your syslog server), or are perhaps running SELinux and are blocked?&lt;/P&gt;

&lt;P&gt;If you see data, then your issues are with either your syslog-NG daemon, or its config, most likely its config.&lt;/P&gt;

&lt;P&gt;You need to have syslog listening on the appropriate protocol, dependent on whether you are sending to tcp or udp; you can listen on both for syslog-NG.  Also, aside from a listener, you must objects such as source, destination, log, filter, parser, rewrite rule, or template.&lt;/P&gt;

&lt;P&gt;If you see data in tcpdump, then copy/paste your syslog-NG config file into this issue, please remove your comments.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Apr 2017 13:58:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322719#M92998</guid>
      <dc:creator>nychawk</dc:creator>
      <dc:date>2017-04-12T13:58:32Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322720#M92999</link>
      <description>&lt;P&gt;Cisco ASA: 10.10.50.1&lt;BR /&gt;
Indexer: 10.10.50.11&lt;BR /&gt;
Forwarder: 10.10.50.12&lt;/P&gt;

&lt;P&gt;In the command line, are you referring "src host" as indexer or Cisco asa? &lt;BR /&gt;
I tried to run the command from forwarder pointing src host as both indexer and cisco asa but result shows No such device. Am I running the command correctly and from the right directory location? &lt;BR /&gt;
Sorry I'm a newbie just 4mth into Splunk, trying to understand how everything works. It's quite difficult trying to learn everything by myself alone, it would be x10 times faster if someone taught me how to do it.&lt;/P&gt;

&lt;P&gt;Please see output below: &lt;/P&gt;

&lt;P&gt;From Forwarder pointing src host as Indexer 10.10.50.11&lt;BR /&gt;
root@forwarder:~# tcpdump -vvv -i 10.10.50.11 udp port 514&lt;BR /&gt;
tcpdump: 10.10.50.11: SIOCETHTOOL(ETHTOOL_GET_TS_INFO) ioctl failed: No such device&lt;BR /&gt;
&amp;nbsp;&lt;BR /&gt;
root@forwarder:~# tcpdump -vvv -i 10.10.50.11 tcp port 514&lt;BR /&gt;
tcpdump: 10.10.50.11: SIOCETHTOOL(ETHTOOL_GET_TS_INFO) ioctl failed: No such device&lt;/P&gt;

&lt;P&gt;From Forwarder pointing src host as Cisco ASA 10.10.50.1&lt;BR /&gt;
root@forwarder:~# tcpdump -vvv -i 10.10.50.1 udp&amp;nbsp; port 514&lt;BR /&gt;
tcpdump: 10.10.50.1: SIOCETHTOOL(ETHTOOL_GET_TS_INFO) ioctl failed: No such device&lt;/P&gt;

&lt;P&gt;root@forwarder:~# tcpdump -vvv -i 10.10.50.1 tcp&amp;nbsp; port 514&lt;BR /&gt;
tcpdump: 10.10.50.1: SIOCETHTOOL(ETHTOOL_GET_TS_INFO) ioctl failed: No such device&lt;/P&gt;

&lt;P&gt;I'm not sure what's going on but my gut tells me that Ciasco asa is not communicating with syslog-ng which is installed on the forwarder server. &lt;/P&gt;

&lt;P&gt;I installed TCPdump and tried running it for the first time use, I'm not sure if some ports are missing or anything but I'm not sure where to look. &lt;BR /&gt;
Does everything look ok? Or anything doesn't look right?  &lt;/P&gt;

&lt;P&gt;TCPDUMP output from forwarder&lt;/P&gt;

&lt;P&gt;root@forwarder:~# tcpdump -i ens160&lt;BR /&gt;
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;
listening on ens160, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;
10:08:21.205181 IP 10.10.50.1.syslog &amp;gt; 10.10.50.12.syslog: SYSLOG local5.error, length: 141&lt;BR /&gt;
10:08:21.205221 IP 10.10.50.12 &amp;gt; 10.10.50.1: ICMP 10.10.50.12 udp port syslog unreachable, length 177&lt;BR /&gt;
10:08:21.205963 IP 10.10.50.12.28344 &amp;gt; dns1.tpgi.com.au.domain: 38283+ PTR? 12.50.10.10.in-addr.arpa. (42)&lt;BR /&gt;
10:08:21.208036 IP dns1.tpgi.com.au.domain &amp;gt; 10.10.50.12.28344: 38283 NXDomain 0/1/0 (119)&lt;BR /&gt;
10:08:21.208235 IP 10.10.50.12.45615 &amp;gt; dns1.tpgi.com.au.domain: 57567+ PTR? 1.50.10.10.in-addr.arpa. (41)&lt;BR /&gt;
10:08:21.209522 IP dns1.tpgi.com.au.domain &amp;gt; 10.10.50.12.45615: 57567 NXDomain 0/1/0 (118)&lt;BR /&gt;
10:08:21.209752 IP 10.10.50.12.38074 &amp;gt; dns1.tpgi.com.au.domain: 11768+ PTR? 35.160.12.203.in-addr.arpa. (44)&lt;BR /&gt;
10:08:21.211518 IP dns1.tpgi.com.au.domain &amp;gt; 10.10.50.12.38074: 11768 1/2/0 PTR dns1.tpgi.com.au. (110)&lt;BR /&gt;
10:08:21.332932 IP 10.10.50.12.35998 &amp;gt; 10.10.50.11.9997: Flags [P.], seq 4241108933:4241109329, ack 1934590004, win 237, options [nop,nop,TS val 128417542 ecr 285094319], length 396&lt;BR /&gt;
10:08:21.333142 IP 10.10.50.11.9997 &amp;gt; 10.10.50.12.35998: Flags [.], ack 396, win 1452, options [nop,nop,TS val 285094735 ecr 128417542], length 0&lt;BR /&gt;
[2]+  Stopped                 tcpdump -i ens160&lt;/P&gt;

&lt;P&gt;TCPDUMP output from Indexer&lt;/P&gt;

&lt;P&gt;root@indexer:~# tcpdump -i ens160&lt;BR /&gt;
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;
listening on ens160, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;
17:35:54.469974 IP 10.10.50.12.35998 &amp;gt; 10.10.50.11.9997: Flags [P.], seq 4241118889:4241119208, ack 1934590004, win 237, options [nop,nop,TS val 128428299 ecr 285104916], length 319&lt;BR /&gt;
17:35:54.470013 IP 10.10.50.12.60808 &amp;gt; 10.10.50.11.9997: Flags [S], seq 604967860, win 29200, options [mss 1460,sackOK,TS val 128428299 ecr 0,nop,wscale 7], length 0&lt;BR /&gt;
17:35:54.470038 IP 10.10.50.11.9997 &amp;gt; 10.10.50.12.35998: Flags [.], ack 319, win 1452, options [nop,nop,TS val 285105492 ecr 128428299], length 0&lt;BR /&gt;
17:35:54.470052 IP 10.10.50.11.9997 &amp;gt; 10.10.50.12.60808: Flags [S.], seq 2536124428, ack 604967861, win 28960, options [mss 1460,sackOK,TS val 285105492 ecr 128428299,nop,wscale 7], length 0&lt;BR /&gt;
17:35:54.470199 IP 10.10.50.12.60808 &amp;gt; 10.10.50.11.9997: Flags [.], ack 1, win 229, options [nop,nop,TS val 128428299 ecr 285105492], length 0&lt;BR /&gt;
17:35:54.470254 IP 10.10.50.12.60808 &amp;gt; 10.10.50.11.9997: Flags [F.], seq 1, ack 1, win 229, options [nop,nop,TS val 128428299 ecr 285105492], length 0&lt;BR /&gt;
17:35:54.470520 IP 10.10.50.11.9997 &amp;gt; 10.10.50.12.60808: Flags [F.], seq 1, ack 2, win 227, options [nop,nop,TS val 285105492 ecr 128428299], length 0&lt;BR /&gt;
17:35:59.441948 IP 10.10.50.12.35998 &amp;gt; 10.10.50.11.9997: Flags [P.], seq 319:688, ack 1, win 237, options [nop,nop,TS val 128429542 ecr 285105492], length 369&lt;BR /&gt;
17:35:59.442022 IP 10.10.50.11.9997 &amp;gt; 10.10.50.12.35998: Flags [.], ack 688, win 1452, options [nop,nop,TS val 285106735 ecr 128429542], length 0&lt;BR /&gt;
17:35:59.442137 IP 10.10.50.12.35998 &amp;gt; 10.10.50.11.9997: Flags [P.], seq 688:779, ack 1, win 237, options [nop,nop,TS val 128429542 ecr 285106735], length 91&lt;BR /&gt;
17:35:59.442169 IP 10.10.50.11.9997 &amp;gt; 10.10.50.12.35998: Flags [.], ack 779, win 1452, options [nop,nop,TS val 285106735 ecr 128429542], length 0&lt;/P&gt;

&lt;P&gt;[7]+  Stopped                 tcpdump -i ens160&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:39:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322720#M92999</guid>
      <dc:creator>jhl226116</dc:creator>
      <dc:date>2020-09-29T13:39:03Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322721#M93000</link>
      <description>&lt;P&gt;I'm too noob to undestand that but please see my further outputs below in response to nychawk. &lt;/P&gt;

&lt;P&gt;What do you think? &lt;/P&gt;</description>
      <pubDate>Thu, 13 Apr 2017 00:18:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322721#M93000</guid>
      <dc:creator>jhl226116</dc:creator>
      <dc:date>2017-04-13T00:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322722#M93001</link>
      <description>&lt;P&gt;This site totally mangled my suggestion, but now that I know your interface name, it is this from your syslog-NG server:&lt;/P&gt;

&lt;P&gt;tcpdump -vvv -i ens160 udp port 514&lt;/P&gt;

&lt;P&gt;If you see data coming from your ASA firewall, then your problem is with your syslog=NG config, which I've asked you to post, but you did not.  As I've said before, I suspect your issue is most likely with your syslog server, given setting up an ASA to send to syslog is pretty straight-forward.  Another root cause might be how you've setup or used DNS, see last line in his comment.&lt;/P&gt;

&lt;P&gt;Based on your output, I am guessing the following:&lt;/P&gt;

&lt;P&gt;indexer is 10.10.50.11&lt;BR /&gt;
your universal forwarder/syslog server is 10.10.50.11&lt;BR /&gt;
ASA Firewall is 10.10.50.1&lt;/P&gt;

&lt;P&gt;Correct?&lt;/P&gt;

&lt;P&gt;Did you configure each of these to communicate using hostnames, or IP addresses? I ask because your tcpdump is showing attempts to resolve internal IP addresses, which will not, should not work.  &lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt; Check that you ASA is sending to an IP address, not a hostname.&lt;/LI&gt;
&lt;LI&gt;Check that your syslog-NG server, which is running your UF, is sending (output.conf) to your indexer using an IP address, not a hostname.&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Thu, 13 Apr 2017 14:31:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322722#M93001</guid>
      <dc:creator>nychawk</dc:creator>
      <dc:date>2017-04-13T14:31:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322723#M93002</link>
      <description>&lt;P&gt;Is this still an issue?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Apr 2017 14:08:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322723#M93002</guid>
      <dc:creator>nychawk</dc:creator>
      <dc:date>2017-04-18T14:08:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322724#M93003</link>
      <description>&lt;P&gt;Hi there, &lt;/P&gt;

&lt;P&gt;Am I wrong or you just create the UDP input on your indexer rather than the Forwarder ?&lt;/P&gt;

&lt;BLOCKQUOTE&gt;
&lt;P&gt;"root@indexer:/opt/&lt;STRONG&gt;splunk&lt;/STRONG&gt;/bin# ./splunk add udp 514 -sourcetype cisco:asa&lt;BR /&gt;
Listening for UDP input on port 514."&lt;/P&gt;
&lt;/BLOCKQUOTE&gt;

&lt;P&gt;This are the basic steps to do what you need, assuming that you have firewall rules/port opened already.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;&lt;P&gt;Enable listen on port 9997 on the Indexer to recieve incoming data from the UF. &lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;./splunk enable listen 9997 -auth username:password
&lt;/CODE&gt;&lt;/PRE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Configure your forwarder to send data to the indexer.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;./splunk add forward-server &amp;lt;IP OR DNS&amp;gt;:9997
&lt;/CODE&gt;&lt;/PRE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Create the UDP input on your UF to listen that syslog.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;./splunk add udp 514 -sourcetype cisco:asa
&lt;/CODE&gt;&lt;/PRE&gt;

&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 18 Apr 2017 15:06:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322724#M93003</guid>
      <dc:creator>alemarzu</dc:creator>
      <dc:date>2017-04-18T15:06:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322725#M93004</link>
      <description>&lt;P&gt;Sorry for the delayed response, I was on a 5 day Easter long weekend break and just got back to work. Thanks for your help. &lt;BR /&gt;
I ran your command and it seems like I'm getting something from the ASA firewall. Do you see the output as data coming in from ASA firewall? If that's the case then as you already predicted it could be a misconfigured syslog-ng which I agree to as I was never confident with it because none of the &lt;BR /&gt;
Instructions really worked well and I don't know what I did really. I need some clear instructions on this.  &lt;/P&gt;

&lt;P&gt;root@forwarder:~# tcpdump -vvv -i ens160 udp port 514&lt;BR /&gt;
tcpdump: listening on ens160, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;
10:01:14.409934 IP (tos 0x0, ttl 255, id 4312, offset 0, flags [none], proto UDP (17), length 188)&lt;BR /&gt;
10.10.50.1.syslog &amp;gt; 10.10.50.12.syslog: [udp sum ok] SYSLOG, length: 160&lt;BR /&gt;
Facility local5 (21), Severity critical (2)&lt;BR /&gt;
Msg: Apr 19 2017 11:05:08 CSOCLABFW01 : %ASA-2-106001: Inbound TCP connection denied from 178.47.249.32/22733 to 61.68.11.85/23 flags SYN on interface outside\0x0a&lt;BR /&gt;
0x0000: 3c31 3730 3e41 7072 2031 3920 3230 3137&lt;BR /&gt;
0x0010: 2031 313a 3035 3a30 3820 4353 4f43 4c41&lt;BR /&gt;
0x0020: 4246 5730 3120 3a20 2541 5341 2d32 2d31&lt;BR /&gt;
0x0030: 3036 3030 313a 2049 6e62 6f75 6e64 2054&lt;BR /&gt;
0x0040: 4350 2063 6f6e 6e65 6374 696f 6e20 6465&lt;BR /&gt;
0x0050: 6e69 6564 2066 726f 6d20 3137 382e 3437&lt;BR /&gt;
0x0060: 2e32 3439 2e33 322f 3232 3733 3320 746f&lt;BR /&gt;
0x0070: 2036 312e 3638 2e31 312e 3835 2f32 3320&lt;BR /&gt;
0x0080: 666c 6167 7320 5359 4e20 206f 6e20 696e&lt;BR /&gt;
0x0090: 7465 7266 6163 6520 6f75 7473 6964 650a&lt;BR /&gt;
10:01:19.657510 IP (tos 0x0, ttl 255, id 6363, offset 0, flags [none], proto UDP (17), length 197)&lt;BR /&gt;
10.10.50.1.syslog &amp;gt; 10.10.50.12.syslog: [udp sum ok] SYSLOG, length: 169&lt;BR /&gt;
Facility local5 (21), Severity warning (4)&lt;BR /&gt;
Msg: Apr 19 2017 11:05:14 CSOCLABFW01 : %ASA-4-106023: Deny udp src inside:10.10.50.2/1028 dst outside:172.30.234.150/5516 by access-group "inside_access_in" [0x0, 0x0]\0x0a&lt;BR /&gt;
0x0000: 3c31 3732 3e41 7072 2031 3920 3230 3137&lt;BR /&gt;
0x0010: 2031 313a 3035 3a31 3420 4353 4f43 4c41&lt;BR /&gt;
0x0020: 4246 5730 3120 3a20 2541 5341 2d34 2d31&lt;BR /&gt;
0x0030: 3036 3032 333a 2044 656e 7920 7564 7020&lt;BR /&gt;
0x0040: 7372 6320 696e 7369 6465 3a31 302e 3130&lt;BR /&gt;
0x0050: 2e35 302e 322f 3130 3238 2064 7374 206f&lt;BR /&gt;
0x0060: 7574 7369 6465 3a31 3732 2e33 302e 3233&lt;BR /&gt;
0x0070: 342e 3135 302f 3535 3136 2062 7920 6163&lt;BR /&gt;
0x0080: 6365 7373 2d67 726f 7570 2022 696e 7369&lt;BR /&gt;
0x0090: 6465 5f61 6363 6573 735f 696e 2220 5b30&lt;BR /&gt;
0x00a0: 7830 2c20 3078 305d 0a&lt;BR /&gt;
10:01:19.657586 IP (tos 0x0, ttl 255, id 25234, offset 0, flags [none], proto UDP (17), length 197)&lt;BR /&gt;
10.10.50.1.syslog &amp;gt; 10.10.50.12.syslog: [udp sum ok] SYSLOG, length: 169&lt;/P&gt;

&lt;P&gt;root@forwarder:~# tcpdump -vvv -i ens160 tcp port 514&lt;BR /&gt;
tcpdump: listening on ens160, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;/P&gt;

&lt;P&gt;I've already provided IP's for the ASA, Indexer and Forwarder in my previous post (In the very beginning). &lt;/P&gt;

&lt;P&gt;Cisco ASA: 10.10.50.1&lt;BR /&gt;
Indexer: 10.10.50.11&lt;BR /&gt;
Forwarder: 10.10.50.12&lt;/P&gt;

&lt;P&gt;I think I configured each of these to communicate using IP addresses, not the hostnames but how do I check? &lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;&lt;P&gt;Check that you ASA is sending to an IP address, not a hostname.&lt;BR /&gt;
I think it's using an IP address, not a hostname but how do I check?&lt;/P&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;P&gt;Check that your syslog-NG server, which is running your UF, is sending (output.conf) to your indexer using an IP address, not a hostname.&lt;BR /&gt;
I think it's using an IP address, not a hostname but how do I check?&lt;BR /&gt;
root@forwarder:~# nano /opt/splunkforwarder/etc/system/local/outputs.conf&lt;BR /&gt;
[tcpout]&lt;BR /&gt;
defaultGroup = default-autolb-group&lt;BR /&gt;
[tcpout:default-autolb-group]&lt;BR /&gt;
server = 10.10.50.11:9997&lt;BR /&gt;
[tcpout-server://10.10.50.11:9997]&lt;/P&gt;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Tue, 29 Sep 2020 13:42:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322725#M93004</guid>
      <dc:creator>jhl226116</dc:creator>
      <dc:date>2020-09-29T13:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322726#M93005</link>
      <description>&lt;P&gt;Yep, I'm just back on it now. Additionally, pls see my response to alemarzu below. I've mistakenly configured UDP 514 on the indexer rather than the forwarder earlier which could have been causing some problems but it has been fixed now as I reconfigured it on the forwarder and removed it from the indexer. &lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 01:23:39 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322726#M93005</guid>
      <dc:creator>jhl226116</dc:creator>
      <dc:date>2017-04-19T01:23:39Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322727#M93006</link>
      <description>&lt;P&gt;You're right, I created UDP input in the indexer rather than in the forwarder. Maybe that's why something's been screwing up. I didn't know that. &lt;BR /&gt;
I've now configured UDP 514 input in the forwarder where the syslog-ng server is installed and removed it from the indexer. &lt;BR /&gt;
Port 9997 was already enabled in the indexer and add forward-server is already present as well since I've configured it before. &lt;BR /&gt;
See the output below: &lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Enable listen on port 9997 on the Indexer to recieve incoming data from the UF. &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; This has been done
./splunk enable listen 9997 -auth username:password&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;root@indexer:/opt/splunk/bin# ./splunk enable listen 9997 -auth admin:seeshock&lt;BR /&gt;
Failed to create. Configuration for port 9997 already exists.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Configure your forwarder to send data to the indexer. &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; This has been done
./splunk add forward-server :9997&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;root@forwarder:/opt/splunkforwarder/bin# ./splunk add forward-server 10.10.50.11:9997&lt;BR /&gt;
10.10.50.11:9997 forwarded-server already present&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt;Create the UDP input on your UF to listen that syslog. &amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt; This has been done
./splunk add udp 514 -sourcetype cisco:asa&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;root@forwarder:/opt/splunkforwarder/bin# ./splunk add udp 514 -sourcetype cisco:asa&lt;BR /&gt;
Listening for UDP input on port 514.&lt;/P&gt;

&lt;P&gt;Also Removed UDP 514 from indexer&lt;/P&gt;

&lt;P&gt;root@indexer:/opt/splunk/bin# ./splunk remove udp 514 -sourcetype cisco:asa&lt;BR /&gt;
Removed udp://514&lt;/P&gt;

&lt;P&gt;Now, how do I test everything is working properly?    Though, I'm still not confident syslog-ng server is configured properly with Cisco ASA. I need some clear instructions on this. Any help would be appreciated. &lt;/P&gt;</description>
      <pubDate>Wed, 19 Apr 2017 02:16:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322727#M93006</guid>
      <dc:creator>jhl226116</dc:creator>
      <dc:date>2017-04-19T02:16:35Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322728#M93007</link>
      <description>&lt;P&gt;Hello again,&lt;/P&gt;

&lt;P&gt;To test if splunk is working correctly, you can deploy a random input to the UF. &lt;/P&gt;

&lt;P&gt;To test if syslog is configured properly, you can configure your syslog client (UF) to write the incoming data to a file.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 02:16:54 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322728#M93007</guid>
      <dc:creator>alemarzu</dc:creator>
      <dc:date>2017-04-20T02:16:54Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322729#M93008</link>
      <description>&lt;P&gt;Hi Guys, &lt;/P&gt;

&lt;P&gt;Think I got it working!&lt;/P&gt;

&lt;P&gt;I ran a search sourcetype="cisco:asa" and it brought up 484,558 events.&lt;/P&gt;

&lt;P&gt;Now I have tons of new questions with things like how to filter syslogs and how to setup and configure NTP as my time stamps are wrong and alot more but for now I'm so happy I got it to work finally!! &lt;/P&gt;

&lt;P&gt;Thanks to all of you guys who helped me to achieve this I couldn't have done it if I hadn't come to this forum with absolutely no help  from anywhere else. &lt;/P&gt;

&lt;P&gt;One more thing I'd like to ask is with the query commands, could someone tell me how I can do standard, general and more discoverable searches with filters, limitations etc with Cisco asa? &lt;/P&gt;

&lt;P&gt;All the search command I know is sourcetype="cisco:asa"&lt;/P&gt;

&lt;P&gt;Thanks heaps guys, really appreciate it. &lt;/P&gt;

&lt;P&gt;Now I'll see if I can get the logs in for the routers and switches as well. &lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 02:18:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322729#M93008</guid>
      <dc:creator>jhl226116</dc:creator>
      <dc:date>2017-04-20T02:18:15Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322730#M93009</link>
      <description>&lt;P&gt;Can you give me an example? &lt;/P&gt;

&lt;P&gt;When I goto Add data&amp;gt;Forward it says, there are currently no forwarders configured as deployment clients to this instance. &lt;/P&gt;

&lt;P&gt;I'm not sure if that's normal. &lt;/P&gt;

&lt;P&gt;Can you do it from the terminal CLI? &lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 02:19:20 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322730#M93009</guid>
      <dc:creator>jhl226116</dc:creator>
      <dc:date>2017-04-20T02:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322731#M93010</link>
      <description>&lt;P&gt;For starters, you cannot run syslog-NG &lt;EM&gt;and&lt;/EM&gt; have your UF listening on udp 514, that will cause a conflict.&lt;/P&gt;

&lt;OL&gt;
&lt;LI&gt; Either stop//disable syslog-NG, or stop the UF from listening on that port; your choice, but not both.&lt;/LI&gt;
&lt;LI&gt;On your inputs on your UF, you will need to point to the file that syslog-NG creates and fills, or, if you chose to listen to udp/514 on the UF, then do nothing.&lt;/LI&gt;
&lt;/OL&gt;

&lt;P&gt;I see you have either given up, or about to give up, on syslog-NG, not a good choice.  I offered to review your syslog-ng.conf, but you never posted that.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 02:28:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322731#M93010</guid>
      <dc:creator>nychawk</dc:creator>
      <dc:date>2017-04-20T02:28:40Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322732#M93011</link>
      <description>&lt;P&gt;oh when did you ask me to post syslog-ng.conf? I wasn't sure how to do that. I see it's in the last line. &lt;BR /&gt;
Let me do that for you, just trying to figure out how. &lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 02:34:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322732#M93011</guid>
      <dc:creator>jhl226116</dc:creator>
      <dc:date>2017-04-20T02:34:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322733#M93012</link>
      <description>&lt;P&gt;Run this lines on your forwarder.&lt;/P&gt;

&lt;UL&gt;
&lt;LI&gt;Configure UF as a client:
&lt;CODE&gt;./splunk set deploy-poll &amp;lt;indexer_ip/dns&amp;gt;:8089&lt;/CODE&gt;&lt;/LI&gt;
&lt;LI&gt;To create a quick random input to test your configuration just execute this on the UF:
&lt;CODE&gt;./splunk add monitor /opt/splunk/copyright.txt -sourcetype configtest -index main&lt;/CODE&gt;&lt;/LI&gt;
&lt;/UL&gt;

&lt;P&gt;Search for &lt;CODE&gt;index=main sourcetype=configtest&lt;/CODE&gt; on your indexer to see if your configuration is working.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 04:05:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322733#M93012</guid>
      <dc:creator>alemarzu</dc:creator>
      <dc:date>2017-04-20T04:05:28Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322734#M93013</link>
      <description>&lt;P&gt;You stated you setup syslog-ng on your UF, the .conf is usually in either /etc or /use/local/etc, run a find&lt;/P&gt;

&lt;P&gt;run this:&lt;BR /&gt;
netstat -tulpn&lt;/P&gt;

&lt;P&gt;The above will show ports open, and by which process. Need to determine if udp 514 is open by Splunk or syslogng &lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 10:47:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322734#M93013</guid>
      <dc:creator>nychawk</dc:creator>
      <dc:date>2017-04-20T10:47:55Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322735#M93014</link>
      <description>&lt;P&gt;If your problem is resolved, please accept one of the answers (perhaps your own) to help future searchers.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 13:45:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322735#M93014</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2017-04-20T13:45:42Z</dc:date>
    </item>
    <item>
      <title>Re: How to send Cisco ASA Firewall logs to syslog-ng server and push it out to the indexer with universal forwarder</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322736#M93015</link>
      <description>&lt;P&gt;You can narrow down your search by selecting any of the fields on the left column, then selecting any of these, i.e. src_ip, etc.&lt;/P&gt;

&lt;P&gt;Look at the Cisco ASA app, has some pretty good searches built-in.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Apr 2017 14:08:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/How-to-send-Cisco-ASA-Firewall-logs-to-syslog-ng-server-and-push/m-p/322736#M93015</guid>
      <dc:creator>nychawk</dc:creator>
      <dc:date>2017-04-20T14:08:15Z</dc:date>
    </item>
  </channel>
</rss>

