It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Barracuda Campus is getting an upgrade!

We are excited to announce that Barracuda Campus will migrate to a new platform around mid-January 2026. Please see the announcement on the Campus Dashboard to find out more.

Integrating Zscaler Internet Access (ZIA)

  • Last updated on

To integrate Zscaler Internet Access, do the following

  • Enable Zscaler Internet Access 

  • Install the XDR Collector 

  • Configure Zscaler Internet Access 

  • Open the ports on the XDR Collector Host (If required)

To enable Zscaler Internet Access 
  1. In Barracuda XDR Dashboard, navigate to Administration> Integrations

  2. On the Zscaler Internet Access (ZIA) card, click Setup.

    ZIACard.png
  3. Select the Enabled check box.

    ZIAEnabled.png
  4. Click Save.

Install the XDR Collector 

If you haven't already set up the XDR Collector, do one of the following: 

When setting up the XDR Collector for either Windows or Linux for Zscaler, don’t follow the log collector procedures in the pages above. You will set up log forwarding in a procedure below.

Configure Zscaler Internet Access 

Barracuda XDR can monitor syslog-formatted messages from Zscaler® Internet Access (ZIA) devices if the Nanolog Streaming Service (NSS) is configured to forward these messages to the appropriate XDR Agents

You can configure the integration to forward different types of event logs. Do any of the following:

  • To forward Firewall logs, follow the To configure Zscaler NSS to send Firewall logs to the agent procedure.

  • To forward Alert logs, follow the To configure Zscaler NSS to send Alerts logs to the agent procedure.

  • To forward Audit logs, follow the To configure Zscaler NSS to send Audit logs to the agent procedure.

  • To forward Endpoint DLP logs, follow the To configure Zscaler NSS to send Endpoint DLP logs to the agent procedure.

  • To forward Web logs, follow the To configure Zscaler NSS to send Web logs to the agent procedure.

  • To forward Tunnel logs, follow the To configure Zscaler NSS to send Tunnel logs to the agent procedure.

  • To forward DNS logs, follow the To configure Zscaler NSS to send DNS logs to the agent procedure.

To configure Zscaler NSS to send Firewall logs to the agent
  1. Copy the following firewall log output format:

\{"version":"v2","sourcetype":"zscalernss-fw","event":\{"datetime":"%s{time}","outbytes":"%ld{outbytes}","cltdomain":"%s{cdfqdn}","destcountry":"%s{destcountry}","cdip":"%s{cdip}","sdip":"%s{sdip}","cdport":"%d{cdport}","sdport":"%d{sdport}","devicemodel":"%s{devicemodel}","action":"%s{action}","duration":"%d{duration}","recordid":"%d{recordid}","tz":"%s{tz}","devicename":"%s{devicename}","devicehostname":"%s{devicehostname}","deviceostype":"%s{deviceostype}","deviceosversion":"%s{deviceosversion}","nwapp":"%s{nwapp}","nwsvc":"%s{nwsvc}","proto":"%s{ipproto}","ipsrulelabel":"%s{ipsrulelabel}","dnatrulelabel":"%s{dnatrulelabel}","rdr_rulename":"%s{rdr_rulename}","rule":"%s{rulelabel}","rulelabel":"%s{erulelabel}","inbytes":"%ld{inbytes}","srcipcountry":"%s{srcip_country}","csip":"%s{csip}","ssip":"%s{ssip}","csport":"%d{csport}","ssport":"%d{ssport}","user":"%s{elogin}","aggregate":"%s{aggregate}","bypassed_session":"%d{bypassed_session}","bypass_time":"%s{bypass_etime}","datacentercity":"%s{datacentercity}","datacentercountry":"%s{datacentercountry}","datacenter":"%s{datacenter}","day_of_month":"%02d{dd}","department":"%s{edepartment}","dept":"%s{dept}","deviceappversion":"%s{deviceappversion}","deviceowner":"%s{deviceowner}","avgduration":"%d{avgduration}","durationms":"%d{durationms}","epochtime":"%d{epochtime}","external_deviceid":"%s{external_deviceid}","flow_type":"%s{flow_type}","forward_gateway_name":"%s{fwd_gw_name}","hour":"%02d{hh}","ipcat":"%s{ipcat}","ips_custom_signature":"%d{ips_custom_signature}","location":"%s{location}","locationname":"%s{elocation}","login":"%s{login}","minute":"%02d{mm}","month":"%s{mon}","month_of_year":"%02d{mth}","dnat":"%s{dnat}","odevicename":"%s{odevicename}","odeviceowner":"%s{odeviceowner}","ofwd_gw_name":"%s{ofwd_gw_name}","odevicehostname":"%s{odevicehostname}","oipcat":"%s{oipcat}","oipsrulelabel":"%s{oipsrulelabel}","ordr_rulename":"%s{ordr_rulename}","orulelabel":"%s{orulelabel}","ozpa_app_seg_name":"%s{ozpa_app_seg_name}","second":"%02d{ss}","numsessions":"%d{numsessions}","stateful":"%s{stateful}","threat_name":"%s{threatname}","threatcat":"%s{threatcat}","threatname":"%s{ethreatname}","tsip":"%s{tsip}","tuntype":"%s{ttype}","year":"%04d{yyyy}","ztunnelversion":"%s{ztunnelversion}","zpa_app_seg_name":"%s{zpa_app_seg_name}"\}\} 

  1. Sign in to the Zscaler Cloud Portal with administrator permissions.

  2. On the Administration tab, in the Cloud Configuration section, click Nanolog Streaming Service.

  3. Click the NSS Feeds tab.

  4. Click Add NSS Feed.

  5. In the Edit NSS Feed dialog, configure these settings:

    • Feed Name — Type a descriptive title for the feed, e.g. Barracuda XDR – ZIA Firewall.

    • NSS Type — Select NSS for Firewall.

    • NSS Server — Select the appropriate server.
      NOTE If only one server is available, it is selected by default.

    • Status — Click Enabled.

    • SIEM IP Address — Type the management IP address of the Agent.

    • SIEM TCP Port — Type 9012.

    • Log Type — Click Firewall Logs.

    • Firewall Log Type — Click Both Session and Aggregate Logs.

    • Feed Output Type — Select Custom.

    • Feed Output Format — Paste the feed output format string that you copied in step 1.

    • Duplicate Logs — Select Disabled.

  6. Click Save.

  7. If you don’t have a firewall, the integration is complete. If you have a firewall, proceed to the To open the ports on the XDR Collector Host procedure.

To configure Zscaler NSS to send Alerts logs to the agent 
  1. Copy the following firewall log output format:
    <%d{syslogid}>%s{Monthname} %2d{Dayofmonth} %02d{Hour}:%02d{Minutes}:%02d{Seconds} [%s{Deviceip}] ZscalerNSS: %s{Eventinfo}\n 

  2. Sign in to the Zscaler Cloud Portal with administrator permissions. 

  3. On the Administration tab, in the Cloud Configuration section, click Nanolog Streaming Service

  4. Click the NSS Feeds tab. 

  5. Click Add NSS Feed

  6. In the Edit NSS Feed dialog, configure these settings: 

    • Feed Name — Type a descriptive title for the feed, e.g. Barracuda XDR – ZIA Alerts 

    • NSS Type — Select NSS for Alert

    • NSS Server — Select the appropriate server.
      NOTE If only one server is available, it is selected by default. 

    • Status — Click Enabled

    • SIEM IP Address — Type the management IP address of the Agent.

    • SIEM TCP Port — Type 9010.

    • Log Type — Click Alert Logs.

    • Feed Output Type — Select Custom

    • Feed Output Format — Paste the feed output format string that you copied in step 1.

    • Duplicate Logs — Select Disabled

  7. Click Save.

  8. If you don’t have a firewall, the integration is complete. If you have a firewall, proceed to the To open the ports on the XDR Collector Host procedure.

To configure Zscaler NSS to send Audit logs to the agent 
  1. Copy the following feed output format:

    \{"version":"v1","sourcetype":"zscalernss-audit","event":\{"time":"%s{time}","recordid":"%d{recordid}","action":"%s{action}","category":"%s{category}","subcategory":"%s{subcategory}","resource":"%s{resource}","interface":"%s{interface}","adminid":"%s{adminid}","clientip":"%s{clientip}","result":"%s{result}","errorcode":"%s{errorcode}","auditlogtype":"%s{auditlogtype}","preaction":%s{preaction},"postaction":%s{postaction}\}\} 

  2. Sign in to the Zscaler Cloud Portal with administrator permissions. 

  3. On the Administration tab, in the Cloud Configuration section, click Nanolog Streaming Service

  4. Click the NSS Feeds tab. 

  5. Click Add NSS Feed

  6. In the Edit NSS Feed dialog, configure these settings: 

    • Feed Name — Type a descriptive title for the feed, e.g. Barracuda XDR – ZIA Audit.

    • NSS Type — Select NSS for Audit

    • NSS Server — Select the appropriate server.
      NOTE If only one server is available, it is selected by default. 

    • Status — Click Enabled

    • SIEM IP Address — Type the management IP address of the Agent. 

    • SIEM TCP Port — Type 9029

    • Log Type — Click Audit Logs

    • Feed Output Type — Select Custom.

    • Feed Output Format — Paste the feed output format string that you copied in step 1.

    • Duplicate Logs — Select Disabled

  7. Click Save.

  8. If you don’t have a firewall, the integration is complete. If you have a firewall, proceed to the To open the ports on the XDR Collector Host procedure.

To configure Zscaler NSS to send Endpoint DLP logs to the agent 
  1. Copy the following feed output format:
    \{"version":"v1","sourcetype":"zscalernss-edlp","event":\{"actiontaken":"%s{actiontaken}","activitytype":"%s{activitytype}","additionalinfo":"%s{addinfo}","channel":"%s{channel}","confirmaction":"%s{confirmaction}","confirmjustification":"%s{confirmjust}","datacenter":"%s{datacenter}","datacentercity":"%s{datacentercity}","datacentercountry":"%s{datacentercountry}","day":"%s{day}","dd":"%02d{dd}","department":"%s{department}","deviceappversion":"%s{deviceappversion}","devicehostname":"%s{devicehostname}","devicemodel":"%s{devicemodel}","devicename":"%s{devicename}","deviceostype":"%s{deviceostype}","deviceosversion":"%s{deviceosversion}","deviceowner":"%s{deviceowner}","deviceplatform":"%s{deviceplatform}","devicetype":"%s{devicetype}","dlpdictcount":"%s{dlpcounts}","dlpdictnames":"%s{dlpdictnames}","dlpenginenames":"%s{dlpengnames}","dlpidentifier":"%llu{dlpidentifier}","dsttype":"%s{dsttype}","eventtime":"%s{eventtime}","expectedaction":"%s{expectedaction}","filedoctype":"%s{filedoctype}","filedstpath":"%s{filedstpath}","filemd5":"%s{filemd5}","filesha":"%s{filesha}","filesrcpath":"%s{filesrcpath}","filetypecategory":"%s{filetypecategory}","filetypename":"%s{filetypename}","hh":"%02d{hh}","itemdstname":"%s{itemdstname}","itemname":"%s{itemname}","itemsrcname":"%s{itemsrcname}","itemtype":"%s{itemtype}","logtype":"%s{logtype}","mm":"%02d{mm}","mon":"%s{mon}","mth":"%02d{mth}","numdlpdictids":"%u{numdlpdictids}","numdlpengineids":"%u{numdlpengids}","odepartment":"%s{odepartment}","odevicehostname":"%s{odevicehostname}","odevicename":"%s{odevicename}","odeviceowner":"%s{odeviceowner}","odlpdictnames":"%s{odlpdictnames}","odlpenginenames":"%s{odlpengnames}","ofiledstpath":"%s{ofiledstpath}","ofilesrcpath":"%s{ofilesrcpath}","oitemdstname":"%s{oitemdstname}","oitemname":"%s{oitemname}","oitemsrcname":"%s{oitemsrcname}","ootherrulelabels":"%s{ootherrulelabels}","otherrulelabels":"%s{otherrulelabels}","orulename":"%s{otriggeredrulelabel}","ouser":"%s{ouser}","recordid":"%llu{recordid}","feedtime":"%s{rtime}","scannedbytes":"%llu{scanned_bytes}","scantime":"%llu{scantime}","severity":"%s{severity}","srctype":"%s{srctype}","ss":"%02d{ss}","datetime":"%s{time}","rulename":"%s{triggeredrulelabel}","timezone":"%s{tz}","user":"%s{user}","yyyy":"%04d{yyyy}","zdpmode":"%s{zdpmode}"\}\} 

  2. Sign in to the Zscaler Cloud Portal with administrator permissions. 

  3. On the Administration tab, in the Cloud Configuration section, click Nanolog Streaming Service

  4. Click the NSS Feeds tab. 

  5. Click Add NSS Feed

  6. In the Edit NSS Feed dialog, configure these settings: 

    • Feed Name — Type a descriptive title for the feed, e.g. Barracuda XDR – ZIA Endpoint DLP. 

    • NSS Type — Select NSS for Endpoint DLP

    • NSS Server — Select the appropriate server.
      NOTE if only one server is available, it is selected by default. 

    • Status — Click Enabled

    • SIEM IP Address — Type the management IP address of the Agent. 

    • SIEM TCP Port — Type 9023. 

    • Log Type — Click Endpoint DLP Logs. 

    • Feed Output Type — Select Custom. 

    • Feed Output Format — Paste the feed output format string that you copied in step 1.

    • Duplicate Logs — Select Disabled

  7. Click Save.

  8. If you don’t have a firewall, the integration is complete. If you have a firewall, proceed to the To open the ports on the XDR Collector Host procedure.

To configure Zscaler NSS to send Web logs to the agent 
  1. Copy the following feed output format:
    \{"version":"v10","sourcetype":"zscalernss-web","event":\{"time":"%s{time}","cloudname":"%s{cloudname}","host":"%s{ehost}","serverip":"%s{sip}","external_devid":"%s{external_devid}","devicemodel":"%s{devicemodel}","action":"%s{action}","recordid":"%d{recordid}","reason":"%s{reason}","threatseverity":"%s{threatseverity}","tz":"%s{tz}","filesubtype":"%s{filesubtype}","upload_filesubtype":"%s{upload_filesubtype}","sha256":"%s{sha256}","bamd5":"%s{bamd5}","filename":"%s{efilename}","upload_filename":"%s{eupload_filename}","filetype":"%s{filetype}","devicename":"%s{edevicename}","devicehostname":"%s{devicehostname}","deviceostype":"%s{deviceostype}","deviceosversion":"%s{deviceosversion}","devicetype":"%s{devicetype}","reqsize":"%d{reqsize}","reqmethod":"%s{reqmethod}","b64referer":"%s{b64referer}","respsize":"%d{respsize}","respcode":"%s{respcode}","reqversion":"%s{reqversion}","respversion":"%s{respversion}","proto":"%s{proto}","company":"%s{company}","dlpmd5":"%s{dlpmd5}","apprulelabel":"%s{eapprulelabel}","dlprulename":"%s{dlprulename}","rulelabel":"%s{erulelabel}","urlfilterrulelabel":"%s{eurlfilterrulelabel}","cltip":"%s{cip}","cltintip":"%s{cintip}","cltsourceport":"%d{clt_sport}","threatname":"%s{threatname}","cltsslcipher":"%s{clientsslcipher}","clttlsversion":"%s{clienttlsversion}","b64url":"%s{b64url}","useragent":"%s{eua}","login":"%s{elogin}","applayerprotocol":"%s{alpnprotocol}","appclass":"%s{appclass}","appname":"%s{appname}","appriskscore":"%s{app_risk_score}","bandwidthclassname":"%s{bwclassname}","bandwidthrulename":"%s{bwrulename}","bwthrottle":"%s{bwthrottle}","bypassedtime":"%s{bypassed_etime}","bypassedtraffic":"%d{bypassed_traffic}","cltsslsessreuse":"%s{clientsslsessreuse}","cltpubip":"%s{cpubip}","cltsslfailcount":"%d{cltsslfailcount}","cltsslfailreason":"%s{cltsslfailreason}","contenttype":"%s{contenttype}","datacentercity":"%s{datacentercity}","datacentercountry":"%s{datacentercountry}","datacenter":"%s{datacenter}","day":"%s{day}","day_of_month":"%02d{dd}","dept":"%s{dept}","deviceappversion":"%s{deviceappversion}","deviceowner":"%s{deviceowner}","df_hosthead":"%s{df_hosthead}","df_hostname":"%s{df_hostname}","dlpdicthitcount":"%s{dlpdicthitcount}","dlpdict":"%s{dlpdict}","dlpeng":"%s{dlpeng}","dlpidentifier":"%d{dlpidentifier}","eedone":"%s{eedone}","epochtime":"%d{epochtime}","fileclass":"%s{fileclass}","flow_type":"%s{flow_type}","forward_gateway_ip":"%s{fwd_gw_ip}","forward_gateway_name":"%s{fwd_gw_name}","forward_type":"%s{fwd_type}","hour":"%02d{hh}","is_sslexpiredca":"%s{is_sslexpiredca}","is_sslselfsigned":"%s{is_sslselfsigned}","is_ssluntrustedca":"%s{is_ssluntrustedca}","is_src_cntry_risky":"%s{is_src_cntry_risky}","is_dst_cntry_risky":"%s{is_dst_cntry_risky}","keyprotectiontype":"%s{keyprotectiontype}","location":"%s{elocation}","malwarecategory":"%s{malwarecat}","malwareclass":"%s{malwareclass}","minute":"%02d{mm}","mobappcategory":"%s{mobappcat}","mobappname":"%s{emobappname}","mobdevtype":"%s{mobdevtype}","module":"%s{module}","month":"%s{mon}","month_of_year":"%02d{mth}","nssserviceip":"%s{nsssvcip}","oapprulelabel":"%s{oapprulelabel}","obwclassname":"%s{obwclassname}","ocip":"%d{ocip}","ocpubip":"%d{ocpubip}","odevicehostname":"%s{odevicehostname}","odevicename":"%s{odevicename}","odeviceowner":"%s{odeviceowner}","odlpdict":"%s{odlpdict}","odlpeng":"%s{odlpeng}","odlprulename":"%s{odlprulename}","ofwd_gw_name":"%s{ofwd_gw_name}","ologin":"%s{ologin}","ordr_rulename":"%s{ordr_rulename}","ourlcat":"%s{ourlcat}","ourlfilterrulelabel":"%s{ourlfilterrulelabel}","ozpa_app_seg_name":"%s{ozpa_app_seg_name}","externalsslpolicyreason":"%s{externalspr}","productversion":"%s{productversion}","prompt_req":"%s{prompt_req}","rdr_rulename":"%s{rdr_rulename}","refererhost":"%s{erefererhost}","reqheadersize":"%d{reqhdrsize}","reqdatasize":"%d{reqdatasize}","respheadersize":"%d{resphdrsize}","respdatasize":"%d{respdatasize}","riskscore":"%d{riskscore}","ruletype":"%s{ruletype}","second":"%02d{ss}","srvcertchainvalpass":"%s{srvcertchainvalpass}","srvcertvalidationtype":"%s{srvcertvalidationtype}","srvcertvalidityperiod":"%s{srvcertvalidityperiod}","srvsslcipher":"%s{srvsslcipher}","serversslsessreuse":"%s{serversslsessreuse}","srvocspresult":"%s{srvocspresult}","srvtlsversion":"%s{srvtlsversion}","srvwildcardcert":"%s{srvwildcardcert}","ssldecrypted":"%s{ssldecrypted}","throttlereqsize":"%d{throttlereqsize}","throttlerespsize":"%d{throttlerespsize}","totalsize":"%d{totalsize}","trafficredirectmethod":"%s{trafficredirectmethod}","unscannabletype":"%s{unscannabletype}","upload_doctypename":"%s{upload_doctypename}","upload_fileclass":"%s{upload_fileclass}","upload_filetype":"%s{upload_filetype}","urlcatmethod":"%s{urlcatmethod}","urlsubcat":"%s{urlcat}","urlsupercat":"%s{urlsupercat}","urlclass":"%s{urlclass}","useragentclass":"%s{uaclass}","useragenttoken":"%s{ua_token}","userlocationname":"%s{euserlocationname}","year":"%04d{yyyy}","ztunnelversion":"%s{ztunnelversion}","zpa_app_seg_name":"%s{zpa_app_seg_name}"\}\} 

  2. Sign in to the Zscaler Cloud Portal with administrator permissions. 

  3. On the Administration tab, in the Cloud Configuration section, click Nanolog Streaming Service

  4. Click the NSS Feeds tab. 

  5. Click Add NSS Feed

  6. In the Edit NSS Feed dialog, configure these settings: 

    • Feed Name — Type a descriptive title for the feed, e.g. Barracuda XDR – ZIA Web. 

    • NSS Type — Select NSS for Web.

    • NSS Server — Select the appropriate server.
      NOTE If only one server is available, it is selected by default. 

    • Status — Click Enabled.

    • SIEM IP Address — Type the management IP address of the Agent. 

    • SIEM TCP Port — Type 9014

    • Log Type — Click Web Logs

    • Feed Output Type — Select Custom. 

    • Feed Escape Character — Type \".
      NOTE Add the characters " and \ in feed escape characters while configuring the Web Log. 

    • Feed Output Format — Paste the feed output format string that you copied in step 1.

    • Duplicate Logs — Select Disabled

  7. Click Save. 

  8. If you don’t have a firewall, the integration is complete. If you have a firewall, proceed to the To open the ports on the XDR Collector Host procedure.

To configure Zscaler NSS to send Tunnel logs to the agent 
  1. Copy the following feed output format:
    \{"version":"v2","sourcetype":"zscalernss-tunnel","event":\{"datetime":"%s{datetime}","day":"%s{day}","dd":"%02d{dd}","destinationip":"%s{destvip}","event":"%s{event}","eventreason":"%s{eventreason}","hh":"%02d{hh}","locationname":"%s{locationname}","mm":"%02d{mm}","mon":"%s{mon}","mth":"%02d{mth}","olocationname":"%s{olocationname}","ovpncredentialname":"%s{ovpncredentialname}","recordid":"%d{recordid}","sourceip":"%s{sourceip}","sourceport":"%d{srcport}","ss":"%02d{ss}","Recordtype":"%s{tunnelactionname}","tunneltype":"%s{tunneltype}","timezone":"%s{tz}","user":"%s{vpncredentialname}","yyyy":"%04d{yyyy}"\}\} 

  2. Sign in to the Zscaler Cloud Portal with administrator permissions. 

  3. On the Administration tab, in the Cloud Configuration section, click Nanolog Streaming Service

  4. Click the NSS Feeds tab. 

  5. Click Add NSS Feed

  6. In the Edit NSS Feed dialog, configure these settings: 

    • Feed Name — Type a descriptive title for the feed, e.g. Barracuda XDR – ZIA Tunnel. 

    • NSS Server — Select the appropriate server.
      NOTE If only one server is available, it is selected by default. 

    • Status — Click Enabled.

    • SIEM IP Address — Type the management IP address of the Agent. 

    • SIEM TCP Port — Type 9013

    • Log Type — Click Tunnel Logs

    • Feed Output Type — Select Custom

    • Feed Output Format — Paste the feed output format string that you copied in step 1.

    • Duplicate Logs — Select Disabled

  7. Click Save. 

  8. If you don’t have a firewall, the integration is complete. If you have a firewall, proceed to the To open the ports on the XDR Collector Host procedure.

To configure Zscaler NSS to send DNS logs to the agent 
  1. Copy the following feed output format:
    \{"version":"v2","sourcetype":"zscalernss-dns","event":\{"user":"%s{elogin}","department":"%s{edepartment}","location":"%s{elocation}","clt_sip":"%s{cip}","cloudname":"%s{cloudname}","company":"%s{company}","datacenter":"%s{datacenter}","datacentercity":"%s{datacentercity}","datacentercountry":"%s{datacentercountry}","day_of_month":"%02d{dd}","dept":"%s{dept}","deviceappversion":"%s{deviceappversion}","devicehostname":"%s{devicehostname}","devicemodel":"%s{devicemodel}","devicename":"%s{devicename}","deviceostype":"%s{deviceostype}","deviceosversion":"%s{deviceosversion}","deviceowner":"%s{deviceowner}","devicetype":"%s{devicetype}","dnsapp":"%s{dnsapp}","dnsappcat":"%s{dnsappcat}","dns_gateway_status":"%s{dnsgw_flags}","dns_gateway_rule":"%s{dnsgw_slot}","dns_gateway_server_protocol":"%s{dnsgw_srv_proto}","category":"%s{domcat}","durationms":"%d{durationms}","ecs_prefix":"%s{ecs_prefix}","ecs_slot":"%s{ecs_slot}","epochtime":"%d{epochtime}","error":"%s{error}","hour":"%02d{hh}","http_code":"%s{http_code}","istcp":"%d{istcp}","loc":"%s{location}","login":"%s{login}","minutes":"%02d{mm}","month":"%s{mon}","month_of_year":"%02d{mth}","odevicehostname":"%s{odevicehostname}","odevicename":"%s{odevicename}","odeviceowner":"%s{odeviceowner}","odomcat":"%s{odomcat}","protocol":"%s{protocol}","recordid":"%d{recordid}","dns_req":"%s{req}","reqaction":"%s{reqaction}","reqrulelabel":"%s{reqrulelabel}","dns_reqtype":"%s{reqtype}","dns_resp":"%s{res}","resaction":"%s{resaction}","respipcategory":"%s{respipcat}","resrulelabel":"%s{resrulelabel}","restype":"%s{restype}","srv_dip":"%s{sip}","srv_dport":"%d{sport}","second":"%02d{ss}","datetime":"%s{time}","tz":"%s{tz}","year":"%04d{yyyy}"\}\} 

  2. Sign in to the Zscaler Cloud Portal with administrator permissions. 

  3. On the Administration tab, in the Cloud Configuration section, click Nanolog Streaming Service

  4. Click the NSS Feeds tab. 

  5. Click Add NSS Feed

  6. In the Edit NSS Feed dialog, configure these settings: 

    • Feed Name — Type a descriptive title for the feed, e.g. Barracuda XDR – ZIA DNS. 

    • NSS Type — Select NSS for Firewall

    • NSS Server — Select the appropriate server.
      NOTE If only one server is available, it is selected by default. 

    • Status — Click Enabled

    • SIEM IP Address — Type the management IP address of the Agent. 

    • SIEM TCP Port — Type 9011. 

    • Log Type — Click DNS Logs. 

    • Feed Output Type — Select Custom. 

    • Feed Output Format — Paste the feed output format string that you copied in step 1.

    • Duplicate Logs — Select Disabled

  7. Click Save. 

  8. If you don’t have a firewall, the integration is complete. If you have a firewall, proceed to the To open the ports on the XDR Collector Host procedure.

To open the ports on the XDR Collector Host 

If you have a firewall protecting your collector, ensure that it allows incoming traffic on the TCP port. Do this for all ports of the feeds configured for Zscaler (firewall, alerts, etc.). 

Here are some examples for commonly used firewalls:

Linux ufw 

sudo ufw allow 9012/tcp 

Linux Iptables 

sudo iptables -A INPUT -p tcp --dport 9012 -j ACCEPT 

Linux firewalld 

sudo firewall-cmd --permanent --add-port=9012/tcp 

Windows 

netsh advfirewall firewall add rule name="Zscaler Firewall" dir=in action=allow protocol=TCP localport=9012 

 

 

 

 

 

 

 

 

 

 

 

Feed Output Format: