When you configure your PacketFence to send log data to USM Appliance, you can use the PacketFence plugin to translate raw log data into normalized events for analysis. The table below provides some basic information for the plugin.

Plugin Information
Device Details
Vendor Inverse Inc.
Device Type Network Access Control
Connection Type Syslog
Data Source Name packetfence
Data Source ID 1876

Integrating PacketFence

Before you configure the PacketFence integration, you must have the IP Address of the USM Appliance Sensor.

To configure PacketFence to send Syslog messages to USM Appliance

Log data collection and Syslog output to USM Appliance is configured by modifying log.conf with a SYSLOG appender. For example:

log4perl.rootLogger=DEBUG, LOGFILE, SYSLOG = INFO





log4perl.appender.LOGFILE.layout.ConversionPattern=%d{MMM dd HH:mm:ss} %X{proc}(%X{tid}) %p: %m (%M)%n

log4perl.appender.SYSLOG = Log::Dispatch::Syslog

log4perl.appender.SYSLOG.ident = packetfence

log4perl.appender.SYSLOG.facility = local5

log4perl.appender.SYSLOG.layout = Log::Log4perl::Layout::SimpleLayout

After creating the appender file, make sure you include your entry in /etc/rsyslog.conf (RHEL), for example:

local5. * @your_syslog

After making changes to the log configuration, restart syslog to have the changes take effect.

Note: Make sure you configure the correct log that you want to send under /usr/local/pf/conf/log.conf.d/.

Plugin Enablement

For plugin enablement information, see Enable Plugins.

Additional Resources and Troubleshooting

For troubleshooting, refer to the vendor documentation: