Skip to main content

Cisco ISR

Cisco Integrated Services Routers (ISRs) are high-performance routers designed to provide advanced security, multicloud access, and wireless capability in one device.

Cisco ISR

This pack includes Cortex XSIAM content.

Configuration on Server Side

You need to configure your Cisco ISR device to forward Syslog messages.

Perform the following in order to configure log forwarding:

  1. Enter Global Configuration Mode by either typing configure terminal or conf t.
  2. Input the destination of where the logs should be sent by typing logging <Hostname OR IP Address\>.

The instructions above set the logging with default configuration values.

More information can be found here

Syslog Time Parsing Support

Support for syslog timestamp parsing is available with UTC timezone only. You will need to add the year and milliseconds to the product default datetime format.

  1. Enter Global Configuration Mode by either typing configure terminal or conf t.
  2. Configure your syslog timestamp formatting by typing the command;
service timestamps log datetime year msec
  1. Optional, to configure the timezone format to UTC, type the command;
clock timezone UTC 0
  1. Revert back to Privileged EXEC mode by typing end.
  2. Save your changes by either typing
write memory


copy running-config startup-config 

And wait for system confirmation.

Collect Events from Vendor

In order to use the collector, use the Broker VM option.

Broker VM

To create or configure the Broker VM, use the information described here.

You can configure the specific vendor and product for this instance.

  1. Navigate to Settings > Configuration > Data Broker > Broker VMs.
  2. Go to the apps tab and add the Syslog app. If it already exists, click the Syslog app and then click Configure.
  3. Click Add New.
  4. When configuring the Syslog Collector, set the following values:
    • vendor as vendor - cisco
    • product as product - isr




Cortex XSIAM


CertificationRead more
Supported ByCortex
CreatedJune 8, 2023
Last ReleaseJuly 16, 2023

Content packs are licensed by the Publisher identified above and subject to the Publisher’s own licensing terms. Palo Alto Networks is not liable for and does not warrant or support any content pack produced by a third-party Publisher, whether or not such packs are designated as “Palo Alto Networks-certified” or otherwise. For more information, see the Marketplace documentation.