UniFi
If you have UniFi firewalls on your network, you can send their logs to Security Onion. Typically, UniFi firewalls can send two different kinds of logs. The first is iptables firewall logs and the second is system logs in CEF format. To get all of these logs into Elasticsearch, you’ll need to add the Elastic integrations for iptables and CEF, configure the UniFi device to send those logs, and then configure the Security Onion firewall to allow those logs.
Add the iptables and CEF integrations
First, add the Elastic integrations for iptables and CEF.
Note
For more information about the iptables integration, see: https://www.elastic.co/docs/reference/integrations/iptables
For more information about the CEF integration, see: https://www.elastic.co/docs/reference/integrations/cef
Go to Elastic Fleet, click the
Agent policiestab, and then click the desired policy (for exampleso-grid-nodes_general).Click the
Add integrationbutton.Search for
iptablesand then click on theiptablesintegration.The Elastic Integration page will show an overview of the iptables Integration. Review all information on the page and then click the
Add iptablesbutton.On the
Add iptables integrationscreen, disable the options labeledCollect iptables application logs (input: logfile)andCollect iptables application logs (input: journald). Make sure thatCollect iptables application logs (input: udp)is enabled and then change theSyslog hostsetting fromlocalhostto0.0.0.0. TheSyslog Portshould be set to9001by default. Click theSave and continuebutton and then clickSave and deploy changes.Back at the desired policy screen, click the
Add integrationbutton.Search for
cefand then click on theCommon Event Format (CEF)integration.The Elastic Integration page will show an overview of the CEF Integration. Review all information on the page and then click the
Add Common Event Format (CEF)button.On the
Add Common Event Format (CEF) integrationscreen, disable the options labeledCollect CEF application logs (input: logfile)andCollect CEF application logs (input: tcp). Make sure thatCollect CEF application logs (input: udp)is enabled and then change theSyslog Hostsetting fromlocalhostto0.0.0.0. TheSyslog Portshould be set to9003by default. Click theSave and continuebutton and then clickSave and deploy changes.
Configure UniFi
Next, configure UniFi to send both types of logs to Security Onion.
Note
UniFi configuration may be different depending on what specific UniFi device you have and what software it is running. These instructions are based on a Cloud Gateway Fiber device running control plane version 4.2.12 and Network application version 9.3.43.
To configure UniFi to send iptables firewall logs to the Elastic integration for iptables:
In the UniFi web interface, navigate to Settings –> CyberSecure –> Traffic Logging.
Next to
Activity Logging (Syslog), choose theSIEM Serveroption.Set the
Server Addressto the IP address of the Security Onion node to send the logs to.Set the
Portto 9001.Click the
Apply Changesbutton.
To configure UniFi to send system logs to the Elastic integration for CEF:
In the UniFi web interface, navigate to Settings –> Control Plane –> Integrations.
Next to
Activity Logging (Syslog), choose theSIEM Serveroption.Set the
Server Addressto the IP address of the Security Onion node to send the logs to.Set the
Portto 9003.Click the
Apply Changesbutton.
While in UniFI, check your UniFi firewall rules and update if necessary:
In the UniFi web interface, navigate to Settings –> Policy Engine.
For any firewall rule that you want to see in Security Onion, make sure that
Syslog Loggingis enabled and the description starts with eitherBlockorAllow.
Allow UniFi logs through Security Onion firewall
Finally, allow the traffic from the UniFi device through the Security Onion firewall to the Elastic integration ports.
Note
The following instructions assume that this is the first firewall change you have made and therefore refer to customhostgroup0 and customportgroup0. If those have already been used, you can select the next available hostgroup and portgroup.
Navigate to Administration –> Configuration.
At the top of the page, click the
Optionsmenu and then enable theShow advanced settingsoption.On the left side, go to
firewall, selecthostgroups, and click thecustomhostgroup0group. On the right side, enter the IP address of the UniFi host and click the checkmark to save.On the left side, go to
firewall, selectportgroups, select thecustomportgroup0group, and then clickudp. On the right side, enter9001and9003and then click the checkmark to save.On the left side, go to
firewall, selectrole, and then select the node type that will receive the UniFi logs. Then drill intochain–>INPUT–>hostgroups–>customhostgroup0–>portgroups. On the right side, entercustomportgroup0and click the checkmark to save.If you would like to apply the rules immediately, click the
SYNCHRONIZE GRIDbutton under theOptionsmenu at the top of the page.
UniFi dashboards
Once all configuration is complete, you should be able to go to Dashboards and select one of the Firewall - UniFi dashboards to see your UniFi logs.