Cisco ASA¶
About¶
The Cisco ASA Family of security devices protects corporate networks and data centers of all sizes. It provides users with highly secure access to data and network resources - anytime, anywhere, using any device. Cisco ASA devices represent more than 15 years of proven firewall and network security engineering and leadership, with more than 1 million security appliances deployed throughout the world.
Product Details¶
Vendor URL: Cisco Adaptive Security Appliance (ASA) Software
Product Type: Hardware
Product Tier: Tier II
Integration Method: Syslog
Integration URL: Cisco ASA - Cyderes Documentation
Log Guide: www.cisco.com
Parser Details¶
Log Format: SYSLOG
Expected Normalization Rate: 75%
Data Label: CISCO_ASA_FIREWALL
UDM Fields (list of all UDM fields leveraged in the Parser):
Log File Field | UDM Field |
---|---|
Statically Defined | metadata.vendor_name |
summary, description, message2 | metadata.description |
Statically Defined | metadata.event_type |
Statically Defined | extensions.auth.type |
Statically Defined | metadata.vendor_name |
Statically Defined | extensions.auth.mechanism |
userid | target.user.user_display_name |
sent_bytes | network.sent_bytes |
received_bytes | network. |
ext_ip | principal.ip |
src, remoteip, dst | target.ip |
localip | src.ip |
userid | principal.user.userid |
groupid | principal.user.groupid |
direction | network.direction |
dst | target.hostname |
dst_port | target.port |
src | principal.hostname |
src | principal.ip |
src_port | principal.port |
proto | network.ip_protocol |
aproto | network.application_protocol |
asa_message | security_result.category_details |
access_group | security_result.rule_name |
cisco_facility | metadata.product_name |
cisco_facility-cisco_severity-asa_message | metadata.product_event_type |
observer | observer.hostname |
observer | observer.ip |
observer_ip | observer.ip |
intermediary_data | intermediary.ip |
intermediary_data | intermediary.hostname |
Product Event Types¶
Some products we only support certain event types. Here are the supported ASA Event IDs.
Cisco Event | Event Description | UDM Event Classification |
---|---|---|
ASA-2-106001 | An attempt was made to connect to an inside address is denied by the security policy that is defined for the specified traffic type. | NETWORK_CONNECTION |
ASA-2-106006 | An inbound UDP packet was denied by the security policy that is defined for the specified traffic type. | NETWORK_CONNECTION |
ASA-3-106010 | An inbound connection was denied by your security policy. | NETWORK_CONNECTION |
ASA-6-106012 | "An IP packet was seen with IP options. Because IP options are considered a security risk | the packet was discarded." |
ASA-3-106014 | "The ASA denied any inbound ICMP packet access. By default | all ICMP packets are denied access unless specifically allowed." |
ASA-6-106015 | The ASA discarded a TCP packet that has no associated connection in the ASA connection table. | NETWORK_CONNECTION |
ASA-2-106016 | A packet arrived at the ASA interface that has a destination IP address of 0.0.0.0 and a destination MAC address of the ASA interface. | NETWORK_CONNECTION |
ASA-6-106017 | "The ASA received a packet with the IP source address equal to the IP destination | and the destination port equal to the source port." |
ASA-2-106020 | The ASA discarded an IP packet with a teardrop signature containing either a small offset or fragment overlapping. This is a hostile event that circumvents the ASA or an Intrusion Detection System. | NETWORK_CONNECTION |
ASA-1-106021 | An attack is in progress. Someone is attempting to spoof an IP address on an inbound connection. | NETWORK_CONNECTION |
ASA-4-106023 | A real IP packet was denied by the ACL. This message appears even if you do not have the log option enabled for an ACL. | NETWORK_CONNECTION |
ASA-6-106100 | The initial occurrence or the total number of occurrences during an interval are listed. | NETWORK_CONNECTION |
ASA-1-106101 | "If you configured the log option for an ACL deny statement (access-list id deny command) | and a traffic flow matches the ACL statement |
ASA-4-106103 | A packet was denied by an access-list that was applied through a VPN filter. This message is the VPN/AAA filter equivalent of message106023. | NETWORK_CONNECTION |
ASA-6-110002 | An error occurred when the ASA tried to find the interface through which to send the packet | NETWORK_CONNECTION |
ASA-6-110003 | An error occurred when the ASA tried to find the next hop on an interface routing table. | NETWORK_CONNECTION |
ASA-5-111008 | "The user entered any command | with the exception of a show command." |
ASA-5-111010 | A user made a configuration change. | NETWORK_CONNECTION |
ASA-6-113004 | "The AAA operation on an IPsec or WebVPN connection has been completed successfully. The AAA types are authentication | authorization |
ASA-6-113005 | The AAA authentication on a connection has failed. | NETWORK_CONNECTION |
ASA-6-113008 | The AAA transaction for a user associated with an IPsec or WebVPN connection was completed successfully. | USER_UNCATEGORIZED |
ASA-6-113009 | The authentication or authorization of an IPsec or WebVPN connection has occurred. | USER_LOGIN |
ASA-6-113012 | The user associated with a IPsec or WebVPN connection has been successfully authenticated to the local user database. | USER_LOGIN |
ASA-4-113019 | An indication of when and why the longest idle user is disconnected. | USER_LOGOUT |
ASA-2-113022 | "The ASA has tried an authentication | authorization |
ASA-2-113023 | The ASA has reactivated the AAA server that was previously marked as failed. The AAA server is now available to service AAA requests. | NETWORK_CONNECTION |
ASA-6-113039 | The AnyConnect session has started for the user in this group at the specified IP address. | USER_LOGIN |
ASA-3-210007 | Stateful Failover failed to allocate a translation slot record. | NETWORK_CONNECTION |
ASA-6-302013 | A TCP connection slot between two hosts was created. | NETWORK_CONNECTION |
ASA-6-302014 | A TCP connection between two hosts was deleted. | NETWORK_CONNECTION |
ASA-6-302015 | A UDP connection slot between two hosts was created. | NETWORK_CONNECTION |
ASA-6-302016 | A UDP connection slot between two hosts was deleted. | NETWORK_CONNECTION |
ASA-6-302020 | An ICMP session was established in the fast-path when stateful ICMP was enabled using the inspect icmp command. | NETWORK_CONNECTION |
ASA-6-302021 | An ICMP session is removed in the fast-path when stateful ICMP is enabled using the inspect icmp command. | NETWORK_CONNECTION |
ASA-6-302022 | A TCP director/backup/forwarder flow has been created. | NETWORK_CONNECTION |
ASA-6-302023 | A TCP director/backup/forwarder flow has been torn down. | NETWORK_CONNECTION |
ASA-6-302024 | A UDP director/backup/forwarder flow has been created. | NETWORK_CONNECTION |
ASA-6-302025 | A UDP director/backup/forwarder flow has been torn down. | NETWORK_CONNECTION |
ASA-6-303002 | A client has uploaded or downloaded a file from the FTP server. | NETWORK_CONNECTION |
ASA-5-304001 | The specified host tried to access the specified URL. | NETWORK_CONNECTION |
ASA-5-304002 | Access from the source address to the specified URL or FTP site was denied. | NETWORK_CONNECTION |
ASA-3-304006 | "The Websense server is unavailable for access | and the ASA attempts to either try to access the same server if it is the only server installed |
ASA-3-305006 | "A protocol (UDP | TCP |
ASA-6-305011 | "A TCP | UDP |
ASA-6-305012 | The address translation slot was deleted. | NETWORK_CONNECTION |
ASA-3-313001 | "When using the icmp command with an access list | if the first matched entry is a permit entry |
ASA-3-313004 | ICMP packets were dropped by the ASA because of security checks added by the stateful ICMP feature. | NETWORK_CONNECTION |
ASA-4-313005 | ICMP error packets were dropped by the ASA because the ICMP error messages are not related to any session already established in the ASA. | NETWORK_CONNECTION |
ASA-3-313008 | "When using the icmp command with an access list | if the first matched entry is a permit entry |
ASA-4-313009 | An ICMP echo request/reply packet was received with a malformed code(non-zero). | NETWORK_CONNECTION |
ASA-6-315011 | An SSH session has ended. | NETWORK_CONNECTION |
ASA-4-400000 | IP options-Bad Option List | NETWORK_CONNECTION |
ASA-6-400001 | IP options-Record Packet Route | NETWORK_CONNECTION |
ASA-6-400002 | IP options-Timestamp | NETWORK_CONNECTION |
ASA-6-400003 | IP options-Security | NETWORK_CONNECTION |
ASA-6-400004 | IP options-Loose Source Route | NETWORK_CONNECTION |
ASA-6-400005 | IP options-SATNET ID | NETWORK_CONNECTION |
ASA-6-400006 | IP options-Strict Source Route | NETWORK_CONNECTION |
ASA-6-400007 | IP Fragment Attack | NETWORK_CONNECTION |
ASA-6-400008 | IP Impossible Packet | NETWORK_CONNECTION |
ASA-6-400009 | IP Fragments Overlap | NETWORK_CONNECTION |
ASA-6-400010 | ICMP Echo Reply | NETWORK_CONNECTION |
ASA-6-400011 | ICMP Host Unreachable | NETWORK_CONNECTION |
ASA-6-400012 | ICMP Source Quench | NETWORK_CONNECTION |
ASA-6-400013 | ICMP Redirect | NETWORK_CONNECTION |
ASA-6-400014 | ICMP Echo Request | NETWORK_CONNECTION |
ASA-6-400015 | ICMP Time Exceeded for a Datagram | NETWORK_CONNECTION |
ASA-6-400016 | ICMP Parameter Problem on Datagram | NETWORK_CONNECTION |
ASA-6-400017 | ICMP Timestamp Request | NETWORK_CONNECTION |
ASA-6-400018 | ICMP Timestamp Reply | NETWORK_CONNECTION |
ASA-6-400019 | ICMP Information Request | NETWORK_CONNECTION |
ASA-6-400020 | ICMP Information Reply | NETWORK_CONNECTION |
ASA-6-400021 | ICMP Address Mask Request | NETWORK_CONNECTION |
ASA-6-400022 | ICMP Address Mask Reply | NETWORK_CONNECTION |
ASA-6-400023 | Fragmented ICMP Traffic | NETWORK_CONNECTION |
ASA-6-400024 | Large ICMP Traffic | NETWORK_CONNECTION |
ASA-6-400025 | Ping of Death Attack | NETWORK_CONNECTION |
ASA-6-400026 | TCP NULL flags | NETWORK_CONNECTION |
ASA-6-400027 | TCP SYN+FIN flags | NETWORK_CONNECTION |
ASA-6-400028 | TCP FIN only flags | NETWORK_CONNECTION |
ASA-6-400029 | FTP Improper Address Specified | NETWORK_CONNECTION |
ASA-6-400030 | FTP Improper Port Specified | NETWORK_CONNECTION |
ASA-6-400031 | UDP Bomb attack | NETWORK_CONNECTION |
ASA-6-400032 | UDP Snork attack | NETWORK_CONNECTION |
ASA-6-400033 | UDP Chargen DoS attack | NETWORK_CONNECTION |
ASA-6-400034 | DNS HINFO Request | NETWORK_CONNECTION |
ASA-6-400035 | DNS Zone Transfer | NETWORK_CONNECTION |
ASA-6-400036 | DNS Zone Transfer from High Port | NETWORK_CONNECTION |
ASA-6-400037 | DNS Request for All Records | NETWORK_CONNECTION |
ASA-6-400038 | RPC Port Registration | NETWORK_CONNECTION |
ASA-6-400039 | RPC Port Unregistration | NETWORK_CONNECTION |
ASA-6-400040 | RPC Dump | NETWORK_CONNECTION |
ASA-6-400041 | Proxied RPC Request | NETWORK_CONNECTION |
ASA-6-400042 | ypserv (YP server daemon) Portmap Request | NETWORK_CONNECTION |
ASA-6-400043 | ypbind (YP bind daemon) Portmap Request | NETWORK_CONNECTION |
ASA-6-400044 | yppasswdd (YP password daemon) Portmap Request | NETWORK_CONNECTION |
ASA-6-400045 | ypupdated (YP update daemon) Portmap Request | NETWORK_CONNECTION |
ASA-6-400046 | ypxfrd (YP transfer daemon) Portmap Request | NETWORK_CONNECTION |
ASA-6-400047 | mountd (mount daemon) Portmap Request | NETWORK_CONNECTION |
ASA-6-400048 | rexd (remote execution daemon) Portmap Request | NETWORK_CONNECTION |
ASA-6-400049 | rexd (remote execution daemon) Attempt | NETWORK_CONNECTION |
ASA-6-400050 | statd Buffer Overflow | NETWORK_CONNECTION |
ASA-6-400051 | Cisco Intrusion Prevention Service signature messages | NETWORK_CONNECTION |
ASA-4-401004 | A packet was dropped because the host defined by IP SRC is a host in the shun database. | NETWORK_CONNECTION |
ASA-4-402119 | An IPsec packet was received with an invalid sequence number. | NETWORK_CONNECTION |
ASA-4-410001 | The clear shun command was entered to remove existing shuns from memory. | NETWORK_CONNECTION |
ASA-3-414001 | The logging module failed to save the logging buffer to an external FTP server. | NETWORK_CONNECTION |
ASA-4-419002 | A duplicate TCP SYN was received during the three-way-handshake that has a different initial sequence number from the SYN that opened the embryonic connection. | NETWORK_CONNECTION |
ASA-6-434002 | A packet has been denied by the module. | NETWORK_CONNECTION |
ASA-6-434004 | SourceFire (SFR) has determined not to inspect more traffic of a flow and requests the ASA to stop redirecting the flow of traffic to SFR. | NETWORK_CONNECTION |
ASA-6-602101 | heASAsent an ICMP destination unreachable message and fragmentation is needed. | NETWORK_CONNECTION |
ASA-6-602303 | A new SA was created. | NETWORK_CONNECTION |
ASA-6-605004 | An incorrect login attempt or a failed login to theASAoccurred. | USER_LOGIN |
ASA-6-605005 | "A user was authenticated successfully | and a management session started." |
ASA-6-607001 | The fixup sip command preallocated a SIP connection after inspecting a SIP message . | NETWORK_CONNECTION |
ASA-6-608001 | The inspect skinny command preallocated a Skinny connection after inspecting a Skinny message . | NETWORK_CONNECTION |
ASA-7-609001 | A network state container was reserved for host ip-address connected to zone zone-name . | GENERIC_EVENT |
ASA-7-609002 | A network state container for host ip-address connected to zone zone-name was removed. | NETWORK_CONNECTION |
ASA06-611101 | User authentication succeeded when accessing theASA. | USER_LOGIN |
ASA-6-611102 | User authentication failed when attempting to access theASA. | USER_LOGIN |
ASA-5-611103 | The specified user logged out. | USER_LOGOUT |
ASA-3-710003 | he ASA denied an attempt to connect to the interface service. | NETWORK_CONNECTION |
ASA-5-713041 | ASA is negotiating a tunnel as the initiator. | NETWORK_CONNECTION |
ASA-5-713049 | An IPsec tunnel has been started | NETWORK_CONNECTION |
ASA-3-713061 | The ASA was not able to find security policy information for the private networks or hosts indicated in the message. | NETWORK_CONNECTION |
ASA-6-713172 | NAT-Traversal auto-detected NAT. | NETWORK_CONNECTION |
ASA-5-713201 | "The ASA has received a duplicate of a previous Phase 1 or Phase 2 packet | and will transmit the last message." |
ASA-5-713202 | The ASA has received a duplicate first packet for a tunnel that the ASA is already aware of and negotiating. | NETWORK_CONNECTION |
ASA-3-713902 | "An error has occurred | which may be the result of a configuration error either on the headend or remote access client." |
ASA-4-713903 | This syslog ID is used for IKE warning messages which can display multiple other syslogs. | NETWORK_CONNECTION |
ASA-5-713904 | "Notification status information appears | which is used to track events that have occurred." |
ASA-6-713905 | "Information status details appear | which are used to track events that have occurred." |
ASA-6-721016 | A remote WebVPN user has logged in successfully and the login information has been installed on the standby unit. | USER_LOGIN |
ASA-6-722022 | The TCP or UDP connection was established with or without compression. | USER_LOGIN |
ASA-6-722023 | The SVC terminated either with or without compression. | USER_LOGOUT |
ASA-5-722033 | The first SVC connection was established for the SVC session. | USER_LOGIN |
ASA-5-722034 | A reconnection attempt has occurred. An SVC connection is replacing a previously closed connection. | NETWORK_CONNECTION |
ASA-6-722036 | A large packet was sent to the client. The source of the packet may not be aware of the MTU of the client. | GENERIC_EVENT |
ASA-4-722037 | An SVC connection was terminated for the given reason. | NETWORK_CONNECTION |
ASA-6-722051 | The specified address has been assigned to the given user. | NETWORK_UNCATEGORIZED |
ASA-6-725001 | "The SSL handshake has started with the remote device | which can be a client or server." |
ASA-6-725002 | The SSL handshake has completed successfully with the remote device. | NETWORK_CONNECTION |
ASA-6-725003 | The remote device is trying to resume a previous SSL session. | NETWORK_CONNECTION |
ASA-6-725006 | The SSL handshake with the remote device has failed. | NETWORK_CONNECTION |
ASA-6-725007 | The SSL session has terminated. | NETWORK_CONNECTION |
ASA-6-725016 | "With server-name indication (SNI) | the certificate used for a given connection may not be the certificate configured on the interface." |
ASA-4-733100 | The specified object in the message has exceeded the specified burst threshold rate or average threshold rate. | GENERIC_EVENT |
ASA-6-734001 | The DAP records that were selected for the connection are listed. | USER_LOGIN |
ASA-6-737026 | The client has assigned the given address from a local pool. | NETWORK_CONNECTION |
ASA-3-751002 | The ASA was unable to find any type of authentication information in the tunnel group that it could use to authenticate itself to the peer. | NETWORK_CONNECTION |
PARSER-5-CFGLOG_LOGGEDCMD | Command logging. | GENERIC_EVENT |
SMART_LIC-3-AUTH_RENEW_FAILED | Smart license authentication failed. | GENERIC_EVENT |
Log Sample¶
<166>COM-ASA %ASA-6-605005: Login permitted from 10.10.10.10/60358 to vpn:10.10.9.1/ssh for user "johndoe"
Sample Parsing¶
metadata.event_timestamp = "2021-08-05T11:12:35.013051Z"
metadata.event_type = "USER_LOGIN"
metadata.vendor_name = "Cisco"
metadata.product_name = "ASA"
metadata.product_event_type = "ASA-6-605005"
metadata.ingested_timestamp = "2021-08-05T11:12:35.013051Z"
principal.user.userid = "johndoe"
principal.ip = "10.10.10.10"
principal.port = 60358
target.ip = "10.10.9.1"
observer.hostname = "COM-ASA"
security_result.category_details = "605005"
security_result.action = "ALLOW"
security_result.severity = "INFORMATIONAL"
security_result.severity_details = "Informational message only"
network.application_protocol = "SSH"
Parser Alerting¶
This product currently does not have any Parser-based Alerting
Rules¶
Coming Soon