LANCOM
LANCOM Systems routers, WLAN controllers and access points provide secure site-to-site VPN, enterprise Wi-Fi and SD-WAN for SMEs.
EnginsightGlobal Fields (4)
| Field | Type | 
|---|---|
ngs.id Unique identifier for the log entry.  | string  | 
ngs.createdAt Timestamp when the event was created locally.  | pdate  | 
ngs.indexedAt Timestamp when the log was indexed into the SIEM.  | pdate  | 
ngs.source Origin or source system of the log.  | string  | 
Reference-Specific Fields (44)
| Field | Type | 
|---|---|
lancom.ulogd.SRC Source IP address of the logged packet.  | text_general  | 
lancom.ulogd.DST Destination IP address of the logged packet.  | text_general  | 
lancom.ulogd.IN Name of the incoming interface on which the packet was received.  | text_general  | 
lancom.ulogd.OUT Name of the outgoing interface on which the packet was sent.  | text_general  | 
lancom.ulogd.PROTO Protocol of the logged packet (e.g., TCP, UDP, ICMP).  | string  | 
lancom.ulogd.dropped Indicates whether the packet was dropped (yes/no).  | string  | 
lancom.ulogd.action Firewall action taken on the packet (e.g., ACCEPT, DROP).  | string  | 
lancom.ulogd.SPT Source port number of the packet.  | plong  | 
lancom.ulogd.DPT Destination port number of the packet.  | plong  | 
lancom.ulogd.SEQ TCP sequence number of the packet.  | plong  | 
lancom.ulogd.PKTS Total number of packets in the connection/session.  | plong  | 
lancom.ulogd.BYTES Total number of bytes in the connection/session.  | plong  | 
lancom.ulogd.event Raw event message or log record details.  | text_general  | 
lancom.ulogd.TYPE Numeric type code associated with the packet or event.  | pint  | 
lancom.ulogd.WINDOW TCP window size advertised by the sender.  | plong  | 
lancom.ulogd.ID IP identification field value of the packet.  | plong  | 
lancom.ulogd.ACK TCP acknowledgment number in the packet.  | plong  | 
lancom.ulogd.URGP TCP urgent pointer value, if any.  | plong  | 
lancom.ulogd.CODE ICMP code value for ICMP packets.  | pint  | 
lancom.ulogd.PREC Type of Service (ToS) precedence bits.  | string  | 
lancom.gpFilter.action Action applied by the group policy filter (e.g., allow, block).  | string  | 
lancom.gpFilter.profile Name of the group policy profile used.  | text_general  | 
lancom.gpFilter.domain Domain or URL category filtered by the policy.  | text_general  | 
lancom.gpFilter.address IP address or subnet filtered by the policy.  | text_general  | 
lancom.gpFilter.category Content category filtered by the policy (e.g., social media).  | text_general  | 
lancom.gpFilter.direction Traffic direction to which the policy applies (inbound/outbound).  | string  | 
lancom.gpAppFilterd.Action Action taken by the application filter (e.g., allowed, blocked).  | string  | 
lancom.gpAppFilterd.In Inbound policy or rule name applied.  | string  | 
lancom.gpAppFilterd.Out Outbound policy or rule name applied.  | string  | 
lancom.gpAppFilterd.Mark Firewall mark or tag assigned to the flow.  | string  | 
lancom.gpAppFilterd.State Connection state as tracked by the application filter (e.g., NEW, ESTABLISHED).  | string  | 
lancom.gpAppFilterd.ConnId Unique connection identifier assigned by the filter.  | string  | 
lancom.gpAppFilterd.Protocolstack Full protocol stack description of the flow (e.g., TCP/IPv4).  | text_general  | 
lancom.gpAppFilterd.Destination Destination endpoint (IP:port) as seen by the application filter.  | text_general  | 
lancom.gpAppFilterd.Source Source endpoint (IP:port) as seen by the application filter.  | text_general  | 
lancom.suricata.Classification Suricata intrusion detection classification of the event.  | text_general  | 
lancom.suricata.Severity Severity level assigned by Suricata to the alert.  | pint  | 
lancom.suricata.SignatureId Identifier of the Suricata signature triggered.  | plong  | 
lancom.suricata.Action Action taken by Suricata (e.g., pass, drop).  | string  | 
lancom.suricata.Source Source IP address detected by Suricata.  | text_general  | 
lancom.suricata.Destination Destination IP address detected by Suricata.  | text_general  | 
lancom.suricata.Name Name of the Suricata rule or alert.  | text_general  | 
lancom.suricata.Ruleset Name of the Suricata ruleset applied.  | string  | 
lancom.suricata.Category Category of the Suricata alert (e.g., trojan, policy).  | string  | 
Sample Log Event
Below is a representative JSON log entry showing key fields as they're emitted by the system. Depending on the context of the event, some fields may be omitted if they're not applicable.