Cisco Meraki
LogZilla App Store application: Cisco Meraki
Overview
Cisco Meraki is a cloud-managed networking platform that provides wireless, switching, security, and SD-WAN solutions. Meraki devices send syslog messages for network flows, URL requests, wireless events, IDS alerts, DHCP leases, content filtering, firewall decisions, VPN connections, and authentication.
App Function
- Parse Meraki syslog events (flows, URLs, wireless, IDS, DHCP, firewall, VPN)
- Extract network metadata (IPs, ports, protocols, MACs)
- Map IDS priority levels to human-readable values (High, Medium, Low)
- Parse user DN fields for identity correlation
- Categorize events by class (network, security, auth)
- Provide dashboards for network monitoring and security analysis
Vendor Documentation
LogZilla Configuration
Meraki devices send logs with a non-standard timestamp format (epoch instead of
RFC 3164/5424 date format). This requires a dedicated syslog port with a
source_type to identify Meraki traffic.
- Navigate to Settings > System > Application Ports
- Set Cisco Meraki syslog port to a dedicated port (e.g.,
5517) - Click Save
The syslog and parser services will reload automatically. Both TCP and UDP listeners are enabled on the configured port.
Meraki Configuration
Configure each Meraki network to send syslog to LogZilla:
- Log in to the Meraki Dashboard
- Navigate to Network-wide > General
- Scroll to Reporting > Syslog servers
- Click Add a syslog server
- Enter the LogZilla server IP address
- Set the Port to 5515 (or the port configured above)
- Select the desired Roles (URLs, Flows, IDS Alerts, etc.)
- Click Save
Verification
Generate test traffic, then verify events appear in LogZilla with Vendor tag
set to Cisco and Product tag set to Meraki.
Incoming Log Format
Meraki devices send logs with an epoch timestamp and device name prefix:
text1566076596.550975289 FR_R23_6 urls src=192.168.1.1:54060 dst=192.168.1.9:443 mac=00:0A:E6:3E:FD:E1 agent='Mozilla/5.0 (Windows NT 10.0; Win64; x64)' request: POST http://192.168.1.9:443/common/EventPoller.jsp
- Timestamp - Unix epoch with nanoseconds
- Device - Meraki device name (MX, MR, MS, etc.)
- Event Type - Log category (urls, flows, events, security_event, firewall)
Parsed Metadata Fields
| Tag Name | Example | Description |
|---|---|---|
Vendor | Cisco | Vendor identifier |
Product | Meraki | Product identifier |
Event Class | security | Cross-vendor event classification |
Event Type | association | Specific event type |
SrcIP | 192.168.1.1 | Source IP address |
DstIP | 8.8.8.8 | Destination IP address |
DstPort | https | Destination port service name |
Protocol | tcp | Network protocol |
MAC | 00:0A:E6:3E:FD:E1 | Client MAC address |
Agent | Mozilla/5.0... | HTTP user agent |
Request | POST | HTTP request method |
Priority | High | IDS alert priority |
Direction | ingress | Traffic direction |
Decision | blocked | Firewall decision |
Category | Web Advertisements | Content filter category |
User | john.smith | Username |
User CN | John Smith | User common name from DN |
User OU | Engineering | User organizational unit from DN |
Leased IP | 192.168.1.100 | DHCP leased IP address |
Client MAC | A0:AA:00:EE:11:D1 | DHCP client MAC |
Server IP | 192.168.1.254 | DHCP server IP |
Local IP | 10.0.0.5 | VPN local IP |
Remote IP | 203.0.113.50 | VPN remote IP |
Connection Type | connect | VPN connection type |
Triggers
| Trigger | Description |
|---|---|
Cisco Meraki: IDS High Priority Alert | High priority IDS alert (notification enabled) |
Cisco Meraki: IDS Medium Priority Alert | Medium priority IDS alert |
Cisco Meraki: Rogue AP Detected | Air Marshal rogue AP detection (notification enabled) |
Dashboards
- Cisco Meraki: Network Overview - Overall network activity, top devices, protocol distribution, firewall decisions
- Cisco Meraki: Security - IDS alerts by priority, content filter blocks, attack sources and targets
- Cisco Meraki: Client Access - Wireless events, DHCP leases, VPN connections, authentication activity
Log Examples
URL Request
text1566076596.550975289 FR_R23_6 urls src=192.168.1.1:54060 dst=192.168.1.9:443 mac=00:0A:E6:3E:FD:E1 agent='Mozilla/5.0 (Windows NT 10.0; Win64; x64)' request: POST http://192.168.1.9:443/common/EventPoller.jsp
Network Flow
text1374543986.038687615 MX84 flows src=192.168.1.186 dst=8.8.8.8 mac=00:0A:E6:3E:FD:E1 protocol=udp sport=55719 dport=53 pattern: allow all
IDS Alert
text1563886829.297656222 MX250 security_event ids_alerted signature=1:28423:1 priority=1 timestamp=1468531589.810079 dhost=98:5A:EB:E1:81:2F direction=ingress protocol=tcp/ip src=151.101.52.238:80 dst=192.168.128.2:53023 message: EXPLOIT-KIT Multiple exploit kit single digit exe detection
DHCP Lease
text1563902014.000926451 MX250 events dhcp lease of ip 192.168.1.103 for client mac A0:AA:00:EE:11:D1 from router 192.168.1.254 on subnet 255.255.255.0 with dns 10.9.8.99, 10.9.8.100
Content Filter Block
text1563899990.039345558 MX250 events content_filtering_block url='https://adserver-us.adtech.advertising.com/...' category0='Web Advertisements' server='10.19.2.12:443' user='CN=Bob\20J.\20Foo,OU=Cloud,DC=foo,DC=net' client_mac='00:0A:E6:3E:FD:E1'
VPN Connection
text1563903781.810242867 MX250 events client_vpn_connect user id 'bob.l.bar' local ip 1.2.3.4 connected from 4.3.2.1