Cisco Wlc

LogZilla App Store application: Cisco Wlc

Overview

Cisco Wireless LAN Controller (WLC) is a family of devices that manage wireless network access points, enabling wireless devices to connect to the network. WLC devices centralize wireless network management, security policies, and user authentication for enterprise wireless deployments. Devices generate syslog messages for client authentication, AP management, rogue detection, and system health.

App Function

  • Parse WLC events from AireOS and C9800 IOS-XE controllers
  • Extract client authentication metadata (MAC, IP, username, SSID)
  • Map security events to MITRE ATT&CK techniques
  • Classify events by type (auth, security, network, system)
  • Provide Event Class-aligned dashboards for different analyst roles
  • Alert on security threats, authentication failures, and system issues

Vendor Documentation

Device Configuration

GUI Configuration

  1. Log into the WLC web interface
  2. Navigate to Management > Logs > Config
  3. In the Syslog Server IP Address field, enter the LogZilla server IP
  4. Click Add
  5. Set Syslog Level to Informational (severity level 6) or Debugging (severity level 7) for full visibility
  6. Set Syslog Facility to Local Use 0 (facility level 16) or leave as default
  7. Click Apply

CLI Configuration

text
config logging syslog host <logzilla_ip>
config logging syslog level informational
config logging syslog facility local0

To configure AP-level logging:

text
config ap logging syslog level informational all
config ap logging syslog host global <logzilla_ip>

Verification

Generate test traffic or trigger a configuration change, then verify events appear in LogZilla with Vendor: Cisco and Product: WLC tags.

Incoming Log Format

Cisco WLC logs use standard Cisco IOS syslog format. The base Cisco app extracts the cisco_mnemonic from the message, then the WLC app processes events matching known WLC mnemonics.

text
%FACILITY-SEVERITY-MNEMONIC: message
  • FACILITY - Cisco facility code (APF, DOT1X, CAPWAP, etc.)
  • SEVERITY - Numeric severity level (0-7)
  • MNEMONIC - Event type identifier
  • message - Event description with variable data

Parsed Metadata Fields

Tag NameExampleDescription
VendorCiscoDevice vendor
ProductWLCProduct line
Event ClassauthEvent classification (auth, security, network, system)
MitreIdT1110MITRE ATT&CK technique ID
MITRE TacticCredential AccessMITRE ATT&CK tactic
Client MAC11:22:33:44:cc:ddMAC address of the wireless client
Client AP MAC11:22:33:44:aa:bbMAC address of the access point
Client UsernamejsmithUsername of the authenticated client
Client IP192.168.1.100IP address assigned to the client
Client SSIDCorporate-WiFiSSID of the wireless network

Log Examples

DOT1X Authentication Failure

text
%DOT1X-5-FAIL: Chassis 1 R0/7: wncd: Authentication failed for client
(3ecc.5479.faaf) with reason (Timeout) on Interface capwap_91c0051d

Client Authenticated

text
%APF-3-AUTHENTICATION_TRAP: apf_80211.c:21442 Client Authenticated:
MACAddress:11:22:33:44:cc:dd Base Radio MAC:11:22:33:44:aa:bb Slot:1
User Name:jsmith Ip Address:192.168.1.100 SSID:Corporate-WiFi

Rogue AP Detected

text
%APF-1-ROGUE_AP_DETECTED: Rogue AP detected: MAC aa:bb:cc:dd:ee:ff on channel 6

AP Disjoin

text
%CAPWAP-3-AP_DISJOIN: AP 00:11:22:33:44:55 has disjoined from controller

MITRE ATT&CK Mapping

Event TypeTechniqueTactic
DOT1X/EAP failuresT1110Credential Access
Rogue AP detectionT1200Initial Access
IP address conflictsT1557Credential Access
Client exclusionsT1499Impact

Dashboards

Dashboards are aligned with Event Class categories for different analyst roles:

DashboardEvent ClassDescription
Cisco Wireless: Securityauth, securityThreats, auth failures, MITRE tactics
Cisco Wireless: NetworknetworkClient activity, SSIDs, APs, roaming
Cisco Wireless: SystemsystemController health, HA events, errors

Triggers

TriggerDescription
Cisco Wireless: MITRE ATT&CK Threat DetectedEvents with MITRE technique mapping
Cisco Wireless: Rogue AP DetectedUnauthorized access point detection (T1200)
Cisco Wireless: Authentication FailureDOT1X/EAP authentication failures (T1110)
Cisco Wireless: IP Spoofing DetectedIP address conflicts (T1557)
Cisco Wireless: Client ExcludedClient exclusion events (T1499)
Cisco Wireless: AP DisjoinAccess point disconnection
Cisco Wireless: HA State ChangeHigh availability failover events
Cisco Wireless: System CriticalCritical system events (severity 0-3)
Cisco Wlc | LogZilla Documentation