본문으로 건너뛰기

AXGATE Firewall Integration

Overview

This integration collects firewall traffic, VPN, IPS, and admin activity logs from AXGATE firewall appliances. AXGATE is a cost-effective Korean firewall vendor with CC certification.

Supported models: AXGATE 50/80/100/200 series


Prerequisites

  • A KYRA MDR Collector installed and running (Installation Guide)
  • AXGATE administrative access
  • Network connectivity from the firewall to the collector on port 514

Configuration

Syslog Setup

  1. Log in to the AXGATE management console
  2. Navigate to 시스템 관리 > 로그 > 외부 로그 서버
  3. Add the KYRA Collector as a syslog destination:
SettingValue
Server IPYour KYRA Collector IP
Port514
ProtocolUDP
  1. Select the log types to forward
  2. Apply and save the configuration

Sample Log Format

AXGATE uses a proprietary key-value format:

date=2026-03-20 time=10:30:00 device=AXGATE-100 type=firewall action=deny src=10.0.0.5 dst=203.0.113.1 dport=443 proto=tcp

Note: KYRA MDR includes a custom parser for AXGATE log format.


Collected Log Types

Log TypeSecurity UsePriority
Firewall trafficNetwork flow visibility, policy violation detectionHigh
VPN (IPSec/SSL)Remote access monitoring and anomaly detectionHigh
IPS eventsIntrusion detection (UTM models)High
NAT logsAddress translation trackingMedium
Admin activityConfiguration change auditingHigh
Web FilterWeb access policy enforcement (UTM models)Medium

Troubleshooting

No Logs Received

  1. Verify the syslog server IP and port are correct in AXGATE settings
  2. Ensure no ACLs block port 514 between the AXGATE and the collector
  3. Check that log forwarding is enabled and applied

Log Parsing Issues

  • AXGATE uses a proprietary format; ensure the KYRA Collector is running the latest parser version
  • Contact kyra@seekerslab.com if you see unparsed log entries