LANCOM

LANCOM router, WLAN controller and AP logs: VPN sessions, RADIUS auth results and roaming events.

Global Fields (4)

FieldType
ngs.id
Unique identifier for the log entry.
string
ngs.createdAt
Timestamp when the event was created locally.
pdate
ngs.indexedAt
Timestamp when the log was indexed into the SIEM.
pdate
ngs.source
Origin or source system of the log.
string

Reference-Specific Fields (44)

FieldType
lancom.ulogd.SRC
Source IP address of the logged packet.
text_general
lancom.ulogd.DST
Destination IP address of the logged packet.
text_general
lancom.ulogd.IN
Name of the incoming interface on which the packet was received.
text_general
lancom.ulogd.OUT
Name of the outgoing interface on which the packet was sent.
text_general
lancom.ulogd.PROTO
Protocol of the logged packet (e.g., TCP, UDP, ICMP).
string
lancom.ulogd.dropped
Indicates whether the packet was dropped (yes/no).
string
lancom.ulogd.action
Firewall action taken on the packet (e.g., ACCEPT, DROP).
string
lancom.ulogd.SPT
Source port number of the packet.
plong
lancom.ulogd.DPT
Destination port number of the packet.
plong
lancom.ulogd.SEQ
TCP sequence number of the packet.
plong
lancom.ulogd.PKTS
Total number of packets in the connection/session.
plong
lancom.ulogd.BYTES
Total number of bytes in the connection/session.
plong
lancom.ulogd.event
Raw event message or log record details.
text_general
lancom.ulogd.TYPE
Numeric type code associated with the packet or event.
pint
lancom.ulogd.WINDOW
TCP window size advertised by the sender.
plong
lancom.ulogd.ID
IP identification field value of the packet.
plong
lancom.ulogd.ACK
TCP acknowledgment number in the packet.
plong
lancom.ulogd.URGP
TCP urgent pointer value, if any.
plong
lancom.ulogd.CODE
ICMP code value for ICMP packets.
pint
lancom.ulogd.PREC
Type of Service (ToS) precedence bits.
string
lancom.gpFilter.action
Action applied by the group policy filter (e.g., allow, block).
string
lancom.gpFilter.profile
Name of the group policy profile used.
text_general
lancom.gpFilter.domain
Domain or URL category filtered by the policy.
text_general
lancom.gpFilter.address
IP address or subnet filtered by the policy.
text_general
lancom.gpFilter.category
Content category filtered by the policy (e.g., social media).
text_general
lancom.gpFilter.direction
Traffic direction to which the policy applies (inbound/outbound).
string
lancom.gpAppFilterd.Action
Action taken by the application filter (e.g., allowed, blocked).
string
lancom.gpAppFilterd.In
Inbound policy or rule name applied.
string
lancom.gpAppFilterd.Out
Outbound policy or rule name applied.
string
lancom.gpAppFilterd.Mark
Firewall mark or tag assigned to the flow.
string
lancom.gpAppFilterd.State
Connection state as tracked by the application filter (e.g., NEW, ESTABLISHED).
string
lancom.gpAppFilterd.ConnId
Unique connection identifier assigned by the filter.
string
lancom.gpAppFilterd.Protocolstack
Full protocol stack description of the flow (e.g., TCP/IPv4).
text_general
lancom.gpAppFilterd.Destination
Destination endpoint (IP:port) as seen by the application filter.
text_general
lancom.gpAppFilterd.Source
Source endpoint (IP:port) as seen by the application filter.
text_general
lancom.suricata.Classification
Suricata intrusion detection classification of the event.
text_general
lancom.suricata.Severity
Severity level assigned by Suricata to the alert.
pint
lancom.suricata.SignatureId
Identifier of the Suricata signature triggered.
plong
lancom.suricata.Action
Action taken by Suricata (e.g., pass, drop).
string
lancom.suricata.Source
Source IP address detected by Suricata.
text_general
lancom.suricata.Destination
Destination IP address detected by Suricata.
text_general
lancom.suricata.Name
Name of the Suricata rule or alert.
text_general
lancom.suricata.Ruleset
Name of the Suricata ruleset applied.
string
lancom.suricata.Category
Category of the Suricata alert (e.g., trojan, policy).
string

Sample Log Event

Below is a representative JSON log entry showing key fields as they’re emitted by the system. Depending on the context of the event, some fields may be omitted if they’re not applicable.