📢 Read the latest Release Notes to learn what's new on Hunters! 💡

Extreme NAC

Prev Next

TL;DR

Supported data types

3rd party

detection

Hunters detection

IOC search

Search

Table name

Log format

Collection method

Extreme NAC Event Logs

✅

✅

extreme_nac_event_logs

TEXT

S3


Overview

Extreme Networks Network Access Control (NAC) event logs, primarily managed within ExtremeCloud IQ - Site Engine (formerly Extreme Management Center), provide comprehensive visibility into network security, authentication, and end-system connectivity. The NAC Manager utilizes several distinct log views for troubleshooting and auditing, including "NAC Manager Events" for system-level errors and configuration changes, "End-Systems Activity" for tracking device connection attempts, and "NAC Appliance Events" to monitor RADIUS activity, reauthentications, and engine-specific logs (e.g., /var/log/tag.log). As of version 7 and higher, End System Event logs are directly written to the MySQL database and can be exported via the Administration tab, while older versions used files in the appdata/logs directory. These logs are crucial for security forensics, allowing administrators to track user logins, MAC addresses, and specific timestamps for network access changes.

Supported data types

Extreme NAC Event Logs

Overview:

Extreme Networks Network Access Control (NAC) event logs, often managed via ExtremeCloud IQ Site Engine or Extreme Management Center, provide comprehensive visibility into network security, authentication, and policy enforcement. These logs, generally viewed within the NAC Manager's Event View, are categorized into several key areas: NAC Manager Events record system-level operations, configuration changes, and connectivity issues with engines; NAC Appliance Events detail RADIUS authentication successes/failures and reauthentication activity; and End-Systems Activity tracks specific user device connections. In newer versions, these end-system events are written directly to a MySQL database, which can be exported via the Administration tab for auditing purposes. The system also generates Audit Events for registration activities, such as when devices are added, removed, or expired via the captive portal. For deeper troubleshooting, diagnostic logs (e.g., tag.log, radius.log) can be accessed directly from the NAC engine CLI or WebView.


Table name: extreme_nac_event_logs


Send data to Hunters

Hunters supports the ingestion of Extreme NAC Event Logs via an intermediary AWS S3 bucket.

To connect Extreme NAC Event Logs:

  1. Export your logs from Extreme NAC Event Logs to an AWS S3 bucket.

  2. Once the export is completed and the logs are collected to S3, follow the steps in this section.

Expected format

Logs are expected in TEXT format:

XIQ-SE End-System Trigger Any conditions Appliances=0.0.0.0'0.0.0.0 macAddress 00:00:00:00:00:00 macOUIVendor HP Inc. ipAddress 0.0.0.0 hostname host2 OS Windows 8/ 8.1/ 10/ 11/ 2012 switchNichName switch2 switchIP 0.0.0.0 switchPort 10122