Cisco Meraki

LogZilla App Store application: Cisco Meraki

Overview

Cisco Meraki is a family of wireless, switching, security, enterprise mobility management (EMM) and security cameras, all centrally managed from the web.

Critical Configuration Requirement

Meraki devices MUST send logs to LogZilla's Raw Port (default: 516) instead of the standard syslog port (514).

Meraki's syslog implementation does not follow RFC standards. If Meraki devices send logs to the standard syslog port, LogZilla will treat them as malformed and they will not be processed correctly.

Required Configuration Steps

  1. Configure Meraki devices to send logs to LogZilla's Raw Port:

    • TCP: Port 516 (Syslog Raw Port)
    • UDP: Port 516 (Syslog Raw UDP Port)
  2. Verify LogZilla Raw Port settings in the LogZilla web interface:

    • Navigate to SettingsSystemSyslog-ng settings
    • Confirm Raw Port configuration
  3. Install the Cisco Meraki app from the LogZilla App Store

More information about Raw Port configuration can be found in Receiving Syslog Events.

App Function

The Cisco Meraki app recognizes and processes multiple types of Meraki log messages. The app identifies the message type, extracts relevant data elements, and creates user tags for analysis and filtering.

Vendor Documentation

Incoming Log Format

Meraki logs use a non-standard format consisting of:

  1. Numeric timestamp - Unix epoch timestamp with microseconds
  2. Device identifier - Meraki device name or serial number
  3. Message type - Category of the logged event (e.g., urls, security_event, events)
  4. Key-value pairs - Event-specific data separated by spaces

Key-value pairs use = as the separator, with values optionally enclosed in double-quotes when they contain spaces or special characters.

Parsed Metadata Fields

The Cisco Meraki app parses data fields for multiple message types. From the data contained within those messages the following user tags are generated:

TaggedTag NameExampleDescription
SrcIP11.22.33.44Source IP address
DstIP55.66.77.88Destination IP address
RequestPOSTHTTP request method
Source to Destination151.101.52.238 -> 192.168.128.2Source to destination IP mapping
Leased IP192.168.1.103DHCP leased IP address
Server IP11.22.33.44Server IP address
Leased MacA0:AA:00:EE:11:D1DHCP leased MAC address
Mac to IP AssignmentA0:AA:00:EE:11:D1 -> 192.168.1.103MAC to IP address mapping
Client Mac00:0A:E6:3E:FD:E1Client MAC address
User Local To Remote IPbob.l.bar: 1.2.3.4 -> 4.3.2.1User with local to remote IP mapping
Status User Local To Remote IPbob.l.bar: connect 1.2.3.4 -> 4.3.2.1Connection status with user and IP mapping
Remote IP44.33.22.11Remote IP address
Local IP11.22.33.44Local IP address
User CNBob Bars A.User common name
User OUCloudUser organizational unit
DeviceFR_R23_6Meraki device identifier
AgentMozilla/5.0...User agent string
SrcPortdynamicSource port
DstPorthttpsDestination port
ProtocoludpNetwork protocol
Matched Signature Id1:28423:1Security signature identifier
PriorityHighEvent priority level
Destination Mac98:5A:EB:E1:81:2FDestination MAC address
DirectioningressTraffic direction
Event TypeassociationWireless association event type
Urlhttps://adserver-us.adtech.advertising.com/...Accessed URL
CategoryWeb AdvertisementsContent category
Userscott.l.fooUsername
Connection TypeconnectConnection type

Troubleshooting

Common Issues

Problem: Meraki logs not appearing in LogZilla

  • Cause: Meraki device sending to standard syslog port (514)
  • Solution: Reconfigure Meraki to send to Raw Port (516)

Problem: Meraki logs appear as unparsed messages

  • Cause: Cisco Meraki app not installed or not processing Raw Port messages
  • Solution: Install Cisco Meraki app from App Store and verify Raw Port configuration

Problem: Missing user tags on Meraki events

  • Cause: Events not matching expected Meraki format patterns
  • Solution: Verify Meraki device is sending logs in expected format (see examples below)

Log Examples

HTTP POST Request

text
1566076596.550975289 FR_R23_6 urls src=192.168.1.1:54060
dst=192.168.1.9:443 mac=00:0A:E6:3E:FD:E1 agent='Mozilla/5.0 (Windows NT
10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
Chrome/76.0.3809.100 Safari/537.36' request: POST
http://192.168.1.9:443/common/EventPoller.jsp

Security Event

text
1563886829.297656222 MX250 security_event ids_alerted
signature=1:28423:1 priority=1 timestamp=1468531589.810079
dhost=98:5A:EB:E1:81:2F direction=ingress protocol=tcp/ip
src=151.101.52.238:80 dst=192.168.128.2:53023 message: EXPLOIT-KIT Multiple
exploit kit single digit exe detection

DHCP Lease

text
1563902014.000926451 MX250 events dhcp lease of ip 192.168.1.103
for client mac A0:AA:00:EE:11:D1 from router 192.168.1.254 on subnet
255.255.255.0 with dns 10.9.8.99, 10.9.8.100
Cisco Meraki | LogZilla Documentation