Syslog Integration with Barracuda Content Shield
You can export log information from your BCS Plus account to your custom logging server using the Syslog feature as described below. Syslog data is available for the following traffic:
Web Filtering Component (WFC) log: Web traffic logs generated by the BCS agent Web Filtering Component (WFC), or when the Barracuda Web Security Gateway is integrated with BCS.
Chromebook
DNS proxy
ATP
Configure Your On-Site Syslog Server and Firewall
On your syslog server, configure the following:
Default port is 6514, or whatever port your administrator decides to use
TLS mode
On your firewall, make sure that traffic from the following IP addresses, depending on your region, are allowed to access the configured port on your syslog server:
AWS East Region: 18.211.131.227 and 18.211.158.158
AWS EU Region: 108.128.34.0 and 63.32.36.170
Configure the BCS Syslog Feature
Log into your BCS account and go to the ACCOUNT SETTINGS page.
On the lower right of the screen, click Configure Syslog.
In the Configure Syslog pop-up window:
Set Enable Syslog to ON.
Enter the Server Address and Port of your syslog server.
Click Save.
To edit the above values after you save them, click EDIT SYSLOG CONFIGURATION.
When BCS connects with your syslog server, the page displays this message:
If BCS cannot connect to your syslog server, the page displays this message:
Turn off Syslog
To stop BCS from sending syslog data to your syslog server:
On the ACCOUNT SETTINGS page, click EDIT SYSLOG CONFIGURATION.
In the confirmation pop-up window, click TURN OFF. You can turn syslogs back on later by reversing the procedure.
After you turn off Syslog, the following message is displayed on the page:
Disconnect BCS From Your Syslog Server
On the ACCOUNT SETTINGS page, click REMOVE SYSLOG.
In the confirmation pop-up window, click REMOVE SYSLOG.
If you want to connect with your syslog server at a later time, you will need to follow instructions to Configure Syslog as described above.
Logs and Data Formats
Web Access Logs
Web access logs are generated either by the BCS agent Web Filtering Component (WFC), Chromebooks, DNS Proxy traffic, or the Barracuda Web Security Gateway when integrated with BCS. Examples of each type of log entry follows. This log data has the following format:
Header Format:
bcs-remote <traffic-log>[]:
In this header, traffic-log type can be any of:
wca-logs (for WFC traffic)
wsg-logs (for traffic when the Barracuda Web Security Gateway is integrated with BCS)
chromebook-logs
dns-logs (for DNS Proxy traffic)
Data Format:
<timestamp> <src_ip> <host/name> <username> <dst_ip> <action> <url> <::categories> <::supercategories> <content_type> <referrer>
Sample log output for each traffic type:
Jun 23 21:28:01 bcs-remote wca-logs[]: 2020-06-23T21:28:01.707Z 10.1.2.214 wfdev-PC6 [wfdev] 198.185.159.176 ALLOWED http://www.tekdefense.com/universal/images/overlay-arrow-left.png [Computing & Internet] [Technology] http://www.tekdefense.com/downloads/
Jun 23 21:26:48 bcs-remote wsg-logs[]: 2020-06-23T21:31:15.193Z 10.42.246.146 cuda229.wfdev.barracuda.com [anonymous] 10.42.246.146 ALLOWED https://data.cnn.com/ [News] [News and Information] -
Jul 8 18:11:21 bcs-remote chromebook-logs[]: 2020-07-08T18:10:43+00:00 172.13.185.58 - [jdoe@gmail.com] 23.205.64.7 ALLOWED http://news.mit.edu/sites/mit.edu.newsoffice/files/styles/article_cover_image_small/public/images/2020/MIT-Brain-Electro-01_1.jpg?itok=mpBO48Fm [Educational Reference] [Education] http://news.mit.eduJun 19 18:16:29 bcs-remote dns-logs[]: 2020-06-19T14:20:35+00:00 198.35.20.112 - [-] - DENIED poker.com [Gambling in General] [Adult Recreation or Illegal] -
These sample logs are described below:
Sample BCS WFC agent log output: The 'wca-logs' in the header portion in the first line signifies log data from the BCS WFC agent.
Source IP address =
10.1.2.214Host/name =
wfdev-PC6Username =
wfdevDestination IP address =
198.185.159.176Action = ALLOWED
URL =
http://www.tekdefense.com/universal/images/overlay-arrow-left.pngCategory =
Computing & InternetSupercategory =
TechnologyReferrer =
http://www.tekdefense.com/downloads/
Sample BCS with Barracuda Web Security Gateway log output: The 'wsg-logs' in the header portion in the second line signifies log data from Barracuda Content Shield Integrated With the Web Security Gateway.
Source IP address =
10.42.246.146Host/name =
cuda229.wfdev.barracuda.comUsername =
anonymousDestination IP address =
10.42.246.146Action = ALLOWED
URL =
https://data.cnn.com/Category =
NewsSupercategory =
News and InformationReferrer = [none]
Sample Chromebook log output: The 'chromebook-logs' in the header portion in the third line signifies log data from Chromebook traffic.
Source IP address =
172.13.185.58Host/name =
empty (no value, indicated by a dash '-')Username =
jdoe@gmail.comDestination IP address =
23.205.64.7Action =
ALLOWEDURL = http://news.mit.edu/sites/mit.edu.newsoffice/files/styles/article_cover_image_small/public/images/2020/MIT-Brain-Electro-01_1.jpg?itok=mpBO48Fm
Category =
Educational ReferenceSupercategory =
EducationReferer =
http://news.mit.edu
Sample DNS Proxy log output: The 'dns-logs' in the header portion in the fourth line signifies log data from DNS proxy traffic.
Source IP address =
198.35.20.112Host/name =
[this field will be empty or populated with a '-']Username =
[this field will be empty or populated with a '-']Destination IP address =
[this field will be empty or populated with a '-']Action = DENIED
URL =
poker.comCategory =
Gambling in GeneralSupercategory =
Adult Recreation or IllegalReferrer =
- (none listed)
ATP Log: This threat log data comes from the ATP virus scanner and has the following format:
Header Format:
bcs-remote atp-logs[]:
Data Format:
<timestamp> <hardware_uuid> <user> <action> <scan_path> <scan_filename> <scan_file_type> <threat_policy> <threat_info> <threat_type>
Sample ATP log output:
Jun 23 23:39:32 bcs-remote atp-logs[]: 2020-06-23T22:59:30.866Z wfdev-PC6 [wfdev] malicious [C:\Users\wfdev\AppData\Local\Google\Chrome\User Data\Default\Cache\f_0005a5] [f_0005a5] application/zip quarantine VIRUS [Heuristics score 100]
Jun 23 23:39:32 bcs-remote atp-logs[]: 2020-06-23T22:25:54.909Z wfdev-PC6 [wfdev] malicious [C:\Users\wfdev\Downloads\Google_Adobe_FlashPlayer.exe.zip] [Google_Adobe_FlashPlayer.exe.zip] application/zip quarantine VIRUS [Heuristics score 100]
First line:
Hardware_uuid =
wfdev-PC6User =
wfdevAction =
maliciousScan path =
C:\Users\wfdev\AppData\Local\Google\Chrome\User Data\Default\Cache\f_0005a5Scan filename =
f_0005a5Scan file type =
application/zipThreat policy =
quarantineThreat type = VIRUS
Threat info =
Heuristics score 100
Second line:
Hardware_uuid =
wfdev-PC6User =
wfdevAction =
maliciouseScan path = C:\Users\wfdev\Downloads\Google_Adobe_FlashPlayer.exe.zipScan filename =
Google_Adobe_FlashPlayer.exe.zipScan file type =
application/zipThreat policy =
quarantineThreat type = VIRUS
Threat info =
Heuristics score 100
Contact Us
Barracuda Campus
Barracuda Support