Configure Network Device - Cisco Meraki

This article will describe the steps required to configure Cisco Meraki to send Syslog messages to the RocketAgent Syslog Server

To configure Cisco Meraki to send log data to RocketCyber Firewall Analyzer,

  1. Open your Meraki dashboard.
  2. Select a device.
  3. Navigate to Network-wide > Configure > General
    Screen_Shot_2021-02-24_at_8.12.59_PM.png
  4. Click Add a Syslog server.
  5. Type the IP address of your RocketAgent Syslog Server in the Server IP field
  6. Type port number 514 in the Port field.
  7. Choose which types of events to send in the Roles box, we require the following roles:
    1. Event Log —The messages from the dashboard under Monitor > Event Log.
    2. Flows — Inbound and outbound traffic flow-generated Syslog messages that include the source, destination, and port numbers.
    3. URL— HTTP GET requests generating Syslog entries.
    4. IDS Alerts - Sends messages related to IDS detections

       The following roles are recommended:

    1. Security Event - Sends messages related to general security events
    2. Security Filtering File Scanned - Sends messages related to file scans
    3. Security Filtering Disposition Change - Sends messages related to file scan results

When the Flows role is enabled on an MX security appliance, logging for individual firewall rules can be enabled/disabled on the Security appliance > Configure > Firewall page, under the Logging column: