Skip to main content

 

Cisco Meraki Documentation

Syslog のイベントタイプ一覧とログのサンプル

このドキュメントは原文を 2025年08月04日付けで翻訳したものです。
最新の情報は原文をご確認ください。

概要

この記事では、最も一般的な Syslog イベントタイプの一覧、それぞれのイベントの説明、および各ログのサンプル出力を提供します。

 

 

Meraki MX セキュリティアプライアンス

 

イベントタイプ 説明 (Description) サンプル Syslog メッセージ
events (Auto VPN) vpn connectivity change(VPN 接続状態の変化) 1380664922.583851938 MX84 events type=vpn_connectivity_change vpn_type='site-to-site' peer_contact='98.68.191.209:51856' peer_ident='2814ee002c075181bb1b7478ee073860' connectivity='false'
events (Auto VPN) vpn connectivity change(VPN 接続状態の変化) 1380664994.337961231 MX84 events type=vpn_connectivity_change vpn_type='site-to-site' peer_contact='98.68.191.209:51856' peer_ident='2814ee002c075181bb1b7478ee073860' connectivity='true'
events uplink connectivity change(アップリンク接続状態の変化) Dec 6 08:46:12 192.168.1.1 1 1386337584.254756845 MX84 events Cellular connection down
events uplink connectivity change(アップリンク接続状態の変化) Dec 6 08:45:24 192.168.1.1 1 1386337535.803931423 MX84 events failover to wan1
events uplink connectivity change(アップリンク接続状態の変化) Dec 6 08:43:43 192.168.1.1 1 1386337435.108107268 MX84 events failover to cellular
events uplink connectivity change(アップリンク接続状態の変化) Dec 6 08:41:44 192.168.1.1 1 1386337316.207232138 MX84 events Cellular connection up
events dhcp no offers
(DHCP オファーなし)
Sep 11 16:12:41 192.168.10.1 1 1599865961.535491111 MX84 events dhcp no offers for mac A4:83:E7:XX:XX:XX host = 192.168.10.1
events dhcp lease
(DHCP リース取得)
Sep 11 16:05:15 192.168.10.1 1 1599865515.687171503 MX84 events dhcp lease of ip 192.168.10.68 from server mac E0:CB:BC:0F:XX:XX for client mac 8C:16:45:XX:XX:XX from router 192.168.10.1 on subnet 255.255.255.0 with dns 8.8.8.8, 8.8.4.4
urls HTTP GET requests
(HTTP GET リクエスト)
1374543213.342705328 MX84 urls src=192.168.1.186:63735 dst=69.58.188.40:80 mac=58:1F:AA:CE:61:F2 request: GET https://...
flows
(廃止、MX18.101 以降では "firewall" で生成されます。)
L3 FW rule matched
(L3 ファイアウォール ルール一致)
1374543986.038687615 MX84 flows src=192.168.1.186 dst=8.8.8.8 mac=58:1F:AA:CE:61:F2 protocol=udp sport=55719 dport=53 pattern: allow all

firewall

cellular_firewall

vpn_firewall

L3 FW rule matched
(L3 ファイアウォール ルール一致)
1374543986.038687615 MX84 firewall src=192.168.1.186 dst=8.8.8.8 mac=58:1F:AA:CE:61:F2 protocol=udp sport=55719 dport=53 pattern: allow all
ids-alerts ids signature matched
(IDS シグネチャ一致)

1377449842.514782056 MX84 ids-alerts signature=129:4:1 priority=3 timestamp=1377449842.512569 direction=ingress protocol=tcp/ip src=74.125.140.132:80

ids-alerts ids signature matched
(IDS シグネチャ一致)
1377448470.246576346 MX84 ids-alerts signature=119:15:1 priority=2 timestamp=1377448470.238064 direction=egress protocol=tcp/ip src=192.168.111.254:56240
security_event ids_alerted ids signature matched
(IDS シグネチャ一致)

signature=1:28423:1 priority=1 timestamp=1468531589.810079
dhost=98:5A:EB:E1:81:2F direction=ingress protocol=tcp/ip src=151.101.52.238:80
dst=192.168.128.2:53023 decision=blocked action=rst message: EXPLOIT-KIT Multiple exploit kit single digit exe detection

security_event security_filtering_file_scanned Malicious file blocked by amp
(AMP により悪意のあるファイルがブロックされた)
url=http://www.eicar.org/download/eicar.com.txt src=192.168.128.2:53150
dst=188.40.238.250:80 mac=98:5A:EB:E1:81:2F
name='EICAR:EICAR_Test_file_not_a_virus-tpd'
sha256=275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f
disposition=malicious action=block
security_event security_filtering_disposition_change File issued retrospective malicious disposition
(ファイルが事後的に悪意ありと判定された)

name=EICAR:EICAR_Test_file_not_a_virus-tpd
sha256=275a021bbfb6489e54d471899f7db9d1663fc695ec2fe2a2c4538aabf651fd0f
disposition=malicious action=allow

events (post MX 15.12) Establishing Phase 1 (IKE_SA) tunnel
(フェーズ 1 (IKE_SA) トンネルの確立)
VPN: <remote-peer-2|12> IKE_SA remote-peer-2[12] established between 192.168.13.5[192.168.13.5]...192.168.13.2[192.168.13.2]
events (post MX 15.12) Establishing Phase 2 (Child_SA) tunnel
(フェーズ 2 (Child_SA) トンネルの確立)
VPN: <remote-peer-2|12> CHILD_SA net-2{1478} established with SPIs cd94e190(inbound) c2b06071(outbound) and TS 192.168.12.0/24 === 192.168.13.0/24
events (post MX 15.12) Destroying Phase 1 (IKE_SA) tunnel
(フェーズ 1 (IKE_SA) トンネルの削除)
VPN: <remote-peer-2|12> deleting IKE_SA remote-peer-2[12] between 192.168.13.5[192.168.13.5]...192.168.13.2[192.168.13.2]
events (post MX 15.12) Destroying Phase 2 (Child_SA) tunnel
(フェーズ 2 (Child_SA) トンネルの削除)
VPN: <remote-peer-2|12> closing CHILD_SA net-2{1478} with SPIs cd94e190(inbound) (0 bytes) c2b06071(outbound) (0 bytes) and TS 192.168.12.0/24 === 192.168.13.0/24
events AnyConnect VPN general (various msgs)
(AnyConnect VPN 全般(各種メッセージ))
1720051390.733639600 labs_appliance events type=anyconnect_vpn_general msg= 'AnyConnect server is started. '
events AnyConnect VPN authentication success
(AnyConnect VPN 認証成功)
1720045578.339796505 labs_appliance events type=anyconnect_vpn_auth_success msg= 'Peer IP=192.168.0.1 Peer port=57096 AAA[7]: AAA authentication successful '
events AnyConnect VPN authentication failure
(AnyConnect VPN 認証失敗)
1720051237.124589040 labs_appliance events type=anyconnect_vpn_auth_failure msg= 'Peer IP=192.168.0.1Peer port[8748] AAA[8]: AAA authenticate failed retval=7 - Authentication failure '
events AnyConnect VPN session manager (various msgs)
(AnyConnect VPN セッションマネージャー(各種メッセージ))
1720045578.340434385 labs_appliance events type=anyconnect_vpn_session_manager msg= 'Sess-ID[7] Peer IP=192.168.0.1 User[miles@meraki.net]: Session connected. Session Type: TLS '
events AnyConnect VPN Connect
(AnyConnect VPN 接続)
1720045578.495767745 labs_appliance events anyconnect_vpn_connect user id 'miles@meraki.net' local ip 192.168.5.224 connected from 192.168.0.1
events AnyConnect VPN Disconnect
(AnyConnect VPN 切断)
1720045578.515109505 labs_appliance events anyconnect_vpn_disconnect user id 'miles@meraki.net' local ip 192.168.5.135 connected from 192.168.0.1
events (pre MX 15.12) purging ISAKMP-SA
(ISAKMP-SA のパージ)
1578424543.894083034 labs_appliance events Site-to-site VPN: purging ISAKMP-SA spi=9d1bb66d7ddc5cf0:d98cd0ed59e82f13
events (pre MX 15.12) ISAKMP-SA deleted
(ISAKMP-SA 削除)
1578424543.918665436 labs_appliance events Site-to-site VPN: ISAKMP-SA deleted 172.24.23.6[4500]-172.24.23.10[4500] spi:9d1bb66d7ddc5cf0:d98cd0ed59e82f13
events (pre MX 15.12) IPsec-SA request queued due to no phase 1 found
(フェーズ1未検出のためIPsec-SAリクエストがキューイング)
1578424549.917669303 labs_appliance events Site-to-site VPN: IPsec-SA request for 172.24.23.10 queued due to no phase1 found
events (pre MX 15.12) failed to get sainfo
(sainfo取得失敗)
1578426208.829677788 labs_Z1 events Site-to-site VPN: failed to get sainfo
events (pre MX 15.12) failed to pre-process ph2 packet
(フェーズ2パケットの前処理失敗)
1578426208.915091184 labs_Z1 events Site-to-site VPN: failed to pre-process ph2 packet (side: 1, status: 1)
events (pre MX 15.12) phase2 negotiation failed due to time up waiting for phase1
(フェーズ1待ちタイムアップによるフェーズ2ネゴ失敗)
1578424408.321445408 labs_appliance events Site-to-site VPN: phase2 negotiation failed due to time up waiting for phase1. ESP 172.24.23.10[0]->172.24.23.6[0]
events (pre MX 15.12) initiate new phase 1 negotiation
(新規フェーズ1ネゴシエーション開始)
1578424549.931720602 labs_appliance events Site-to-site VPN: initiate new phase 1 negotiation: 172.24.23.6[500]<=>172.24.23.10[500]
events (pre MX 15.12) ISAKMP-SA established
(ISAKMP-SA 確立)
1578424550.965202127 labs_appliance events Site-to-site VPN: ISAKMP-SA established 172.24.23.6[4500]-172.24.23.10[4500] spi:fb903f191f1c7566:4dc90bd31c7884c1
events (pre MX 15.12) initiate new phase 2 negotiation
(新規フェーズ2ネゴシエーション開始)
1578424550.975495647 labs_appliance events Site-to-site VPN: initiate new phase 2 negotiation: 172.24.23.6[4500]<=>172.24.23.10[4500]
events (pre MX 15.12) IPsec-SA established
(IPsec-SA 確立)
1578424551.120459981 labs_appliance events Site-to-site VPN: IPsec-SA established: ESP/Tunnel 172.24.23.6[4500]->172.24.23.10[4500] spi=241280704(0xe61a6c0)

priority(優先度)スコアは Snort の値に基づいています。優先度は以下の通りです:

1 - 高優先度アラート
2 - 中優先度アラート
3 - 低優先度アラート
4 - 非常に低い優先度アラート

サンプル Syslog メッセージの一部の値(デバイスのホスト名、タイムスタンプ等)は変数であり、他のデバイスで生成された Syslog メッセージとは異なる場合があります。

urls イベントタイプでは、リクエスト部分の URL が 500 文字で切り捨てられます。

コンテンツフィルタリングイベントは Syslog に送信されます。これらを送信するには、Syslog サーバーの設定に「URLs」ロールを追加する必要があります。

Meraki MS スイッチ

イベントタイプ 説明 (Description) サンプル Syslog メッセージ
events port status change
(ポート状態の変更)
1379967288.409907239 MS220_8P events port 3 status changed from 100fdx to down
events port status change
(ポート状態の変更)
1379967295.290863061 MS220_8P events port 3 status changed from down to 100fdx
events spanning-tree guard state change
(スパニングツリーガード状態の変更)
1379970281.577982192 MS220_8P events Port 5 received an STP BPDU from 78:FE:3D:90:7F:43 so the port was blocked
events spanning-tree interface role change
(スパニングツリーインターフェースロールの変更)
1379970476.195563376 MS220_8P events Port 5 changed STP role from designated to alternate
events spanning-tree interface role change
(スパニングツリーインターフェースロールの変更)
1379969188.448725072 MS220_8P events Port 1 changed STP role from root to designated
events spanning-tree interface role change
(スパニングツリーインターフェースロールの変更)
1379970772.184373058 MS220_8P events Port 5 changed STP role from alternate to root
events spanning-tree interface role change
(スパニングツリーインターフェースロールの変更)
1379972501.619445657 MS220_8P events Port 1 changed STP role from disabled to designated
events blocked DHCP server response
(DHCP サーバーレスポンスのブロック)
1379988354.643337272 MS220_8P events Blocked DHCP server response from 78:FE:3D:90:7F:48 on VLAN 100
events 802.1X deauthentication
(802.1X 認証解除)
1380653487.002002676 MS220_8P events type=8021x_deauth port='' identity='employee@ikarem.com'
events 802.1X eap success
(802.1X EAP 成功)
1380653443.857790533 MS220_8P events type=8021x_eap_success port='' identity='employee@ikarem.com'
events 802.1X authentication
(802.1X 認証)
1380653443.868786613 MS220_8P events type=8021x_auth port='3' identity='employee@ikarem.com'
events 802.1X client deauthentication
(802.1X クライアント認証解除)
1380653486.994003049 MS220_8P events type=8021x_client_deauth port='3' identity='employee@ikarem.com'
events Virtual router collision
(仮想ルーターの衝突)
1379988354.643337272 MS320_24P events Received VRRP packet for virtual router 1 from a.a.a.a on VLAN x with incompatible configuration
events VRRP transition
(VRRP 遷移)
1379988354.643337272 MS320_24P events changed from VRRP passive to VRRP active because it has not received packets from the active
events Power supply inserted
(電源投入)
1379988354.643337272 MS320_24P events Power supply xxxx-xxxx-xxxx was inserted into slot 1
events OSPF(OSPF) future enhancement(今後の拡張予定)
events DHCP Server
(DHCP サーバー)
future enhancement(今後の拡張予定)

Meraki MR アクセスポイント

イベントタイプ イベント説明 (Event description) サンプル Syslog メッセージ
events 802.11 association
(802.11 アソシエーション)
1380653443.857790533 MR18 events type=association radio='0' vap='1' channel='6' rssi='23' aid='1813578850'
events 802.11 disassociation
(802.11 ディスアソシエーション)
1380653443.857790533 MR18 events type=disassociation radio='0' vap='1' channel='6' reason='8' instigator='2' duration='11979.728000' auth_neg_dur='1380653443.85779053324000' last_auth_ago='5.074000' is_wpa='1' full_conn='1.597000' ip_resp='1.597000' ip_src='192.168.111.251' arp_resp='1.265000' arp_src='192.168.111.251' dns_server='192.168.111.1' dns_req_rtt='1380653443.85779053335000' dns_resp='1.316000' aid='1813578850'
events WPA authentication
(WPA 認証)
1380653443.857790533 MR18 events type=wpa_auth radio='0' vap='1' aid='1813578850'
events WPA deauthentication
(WPA 認証解除)
1380653443.857790533 MR18 events type=wpa_deauth radio='0' vap='1' aid='1813578850'
events WPA failed authentication attempt
(WPA 認証失敗試行)
1380653443.857790533 MR18 events type=disassociation radio='0' vap='3' channel='6' reason='2' instigator='3' duration='6.003000' auth_neg_failed='1' is_wpa='1' aid='113930199'
events 802.1X failed authentication attempt
(802.1X 認証失敗試行)
1380653443.857790533 MR18 events type=8021x_eap_failure radio='0' vap='3' identity='woody8@gmail.com' aid='1701992265'
events 802.1X deauthentication
(802.1X 認証解除)
1380653443.857790533 MR18 events type=8021x_deauth radio='0' vap='3' identity='woody8@gmail.com' aid='1701992265'
events 802.1X authentication
(802.1X 認証)
1380653443.857790533 MR18 events type=8021x_eap_success radio='0' vap='3' identity='woody8@gmail.com' aid='1849280097'
events splash authentication
(スプラッシュ認証)
1380653443.857790533 MR18 events type=splash_auth ip='10.87.195.250 [More Information] ' duration='3600' vap='2' download='5242880bps' upload='5242880bps'
events wireless packet flood detected
(無線パケットフラッド検出)
1380653443.857790533 MR18 events type=device_packet_flood packet='deauth' device='00:18:0A:27:43:80' radio='0' state='start' alarm_id='4' dos_count='25' inter_arrival='10000'
events wireless packet flood end
(無線パケットフラッド終了)
1380653443.857790533 MR18 events type=device_packet_flood radio='0' state='end' alarm_id='4' reason='left_channel'
events rogue SSID detected*
(不正 SSID 検出*)
airmarshal_events type= rogue_ssid_detected ssid='' bssid='02:18:5A:AE:56:00' src='02:18:5A:AE:56:00' dst='02:18:6A:13:09:D0' wired_mac='00:18:0A:AE:56:00' vlan_id='0' channel='157' rssi='21' fc_type='0' fc_subtype='5'
  SSID spoofing detected*
(SSID なりすまし検出*)
airmarshal_events type= ssid_spoofing_detected ssid='t-nebojsa_devel1' vap='2' bssid='02:18:5A:14:04:E2' src='02:18:5A:14:04:E2' dst='FF:FF:FF:FF:FF:FF' channel='48' rssi='39' fc_type='0' fc_subtype='8'
urls** HTTP GET requests
(HTTP GET リクエスト)
Dec 6 08:46:12 192.168.1.1 1 1386337584.254756845 MX84 events Cellular connection down1380653443.857790533 MR18 urls src=192.168.111.253:50215 dst=204.154.94.81:443 mac=F8:1E:DF:E2:EF:F1 request: UNKNOWN https://www.evernote.com/...
flows flow allowed by Layer 3 firewall
(L3 ファイアウォールによるフロー許可)
1380653443.857790533 MR18 flows allow src=192.168.111.253 dst=192.168.111.5 mac=F8:1E:DF:E2:EF:F1 protocol=tcp sport=54252 dport=80
flows flow denied by Layer 3 firewall
(L3 ファイアウォールによるフローブロック)
1380653443.857790533 MR18 flows deny src=10.20.213.144 dst=192.168.111.5 mac=00:F4:B9:78:58:01 protocol=tcp sport=52421 dport=80

 

* rogue_ssid_detected および ssid_spoofing_detected は MR29 以降のファームウェアで削除されています。

 

**urls request: UNKNOWN は、URL が暗号化されているために発生する可能性があります。

 

  • Was this article helpful?