Cisco Firepower Firewall¶
About¶
The Cisco Firepower® NGFW (next-generation firewall) is the industry’s first fully integrated, threat-focused next-gen firewall with unified management. It uniquely provides advanced threat protection before, during, and after attacks.
Product Details¶
Vendor URL: Cisco Firepower Firewall
Product Type: Firewall
Product Tier: Tier II
Integration Method: Syslog
Integration URL: Cisco Firepower Firewall
Log Guide: Cisco Firepower Firewall)
Parser Details¶
Log Format: Syslog
Expected Normalization Rate: 90-100%
Data Label: CISCO_FIREPOWER_FIREWALL
UDM Fields (list of all UDM fields leveraged in the Parser):
Log File Field | UDM Event Classification |
---|---|
AccessControlRuleAction | security_result.action |
AccessControlRuleName | security_result.rule_name |
action | security_result.action |
app | principal.application |
ApplicationProtocol | network.application_protocol |
cert_issuer | network.tls.server.certificate.issuer |
cert_Subject | network.tls.server.certificate.subject |
Classification | security_result.rule_name |
Client | network.http.user_agent |
DeviceUUID | observer.hostname |
DeviceUUID | principal.resource.id |
direction | network.direction |
DNSQuery | network.dns.questions |
DNSRecordType | security_result.about.labels.key.DNSRecordType |
domain | target.administrative_domain |
dst | target.ip |
dst | target.hostname |
dst_port | target.port |
duration | network.session_duration |
EgressInterface | principal.asset.attribute.labels.key.EgressInterface |
EgressZone | target.asset.attribute.cloud.availability_zone |
EgressZone | target.location.name |
eventId | metadata.product_event_type |
FileAction | security_result.summary |
FileName | target.file.full_path |
FilePolicy | security_result.rule_name |
FileSandboxStatus | security_result.description |
FileSHA256 | target.file.sha256 |
FileSize | target.file.size |
GID | principal.asset.product_object_id |
group_name | target.group.group_display_name |
HTTPReferer | network.http.referral_url |
HTTPResponse | network.http.response_code |
IngressInterface | principal.asset.attribute.labels.key.IngressInterface |
IngressZone | principal.location.name |
InitiatorBytes | network.received_bytes |
InlineResult | security_result.action |
int_IP | intermediary.ip |
IntHost | intermediary.hostname |
IntrusionPolicy | security_result.rule_name |
mac | principal.mac |
Message | security_result.description |
NAPPolicy | security_result.category_details |
NAPPolicy | principal.asset.attribute.labels.key.NAPPolicy |
Priority | security_result.priority_details |
process_name | principal.process.command_line |
proto | network.ip_protocol |
ResponderBytes | network.sent_bytes |
Revision | security_result.about.labels.key.Singnature_Version |
rule_name | security_result.rule_name |
rule_name | target.resource.name |
sent_bytes | network.sent_bytes |
serial_No | network.tls.server.certificate.serial |
session_id | network.session_id |
severity | security_result.severity_details |
severity | security_result.severity |
SID | security_result.threat_id |
src | principal.hostname |
src | principal.ip |
src_nat_ip | principal.nat_ip |
src_nat_ip | principal.hostname |
src_port | principal.port |
summary | security_result.summary |
ThreatName | security_result.threat_name |
tls_version | network.tls.version |
URI | target.url |
URLCategory | security_result.category_details |
URLReputation | security_result.confidence_details |
User | extensions.auth.auth_details |
user_id | target.user.userid |
userAgent | network.http.user_agent |
username | target.user.userid |
UserName | target.user.userid |
version | principal.platform_version |
WebApplication | target.application |
Product Event Types¶
eventId, AccessControlRuleAction | UDM Event Classification | Security Category | alerting enabled |
---|---|---|---|
all others | NETWORK_CONNECTION | ||
Block | ACL_VIOLATION | ||
dst = blank | |||
src = blank | STATUS_UPDATE | ||
Login | USER_LOGIN | ||
Task Queue | SCHEDULED_TASK_UNCATEGORIZED | ||
Rule Update Install | USER_RESOURCE_UPDATE_CONTENT | ||
Correlation Event | USER_LOGIN | ||
106023 | ACL_VIOLATION | ||
303002 | NETWORK_FTP | ||
419002 | TRUE | ||
313005 | TRUE | ||
302020 | FILE_CREATION,FILE_UNCATEGORIZED | POLICY_VIOLATION | |
733100 | TRUE | ||
430002 | NETWORK_RECON | TRUE | |
430003 | NETWORK_RECON | TRUE | |
430001 | NETWORK_UNCATEGORIZED | NETWORK_SUSPICIOUS | TRUE |
Log Sample¶
<190>2022-06-12T15:36:51Z host (null) %NGIPS-6-430003: EventPriority: Low, DeviceUUID: asl31010, InstanceID: 2, FirstPacketSecond: 2022-06-12T15:36:51Z, ConnectionID: 55887, AccessControlRuleAction: Allow, SrcIP: 10.1.1.2, DstIP: 10.1.1.5, ICMPType: Echo Request, ICMPCode: No Code, Protocol: icmp, IngressInterface: EXT, EgressInterface: DMZ, IngressZone: Outside, EgressZone: Datacenter, ACPolicy: Datacenter, AccessControlRuleName: IPS Inspeccion, Client: ICMP client, ApplicationProtocol: ICMP, ConnectionDuration: 0, InitiatorPackets: 1, ResponderPackets: 1, InitiatorBytes: 72, ResponderBytes: 72, NAPPolicy: Balanced Security and Connectivity
Sample Parsing¶
metadata.event_timestamp = "2022-06-12T15:36:50Z"
metadata.event_type = "GENERIC_EVENT"
metadata.vendor_name = "Cisco"
metadata.product_name = "Firepower Firewall"
metadata.product_event_type = "NGIPS-6-430003"
metadata.ingested_timestamp = "2022-06-12T15:38:02.863875Z"
principal.location.name = "Outside"
principal.resource.id = "asl31010"
principal.asset.attribute.labels.key = "EgressInterface"
principal.asset.attribute.labels.value = "DMZ"
principal.asset.attribute.labels.key = "IngressInterface"
principal.asset.attribute.labels.value = "EXT"
principal.asset.attribute.labels.key = "NAPPolicy"
principal.asset.attribute.labels.value = "Balanced Security and Connectivity"
target.location.name = "Datacenter"
target.asset.attribute.cloud.availability_zone = "Datacenter"
security_result.rule_name = "AccessControlRuleName : IPS Inspeccion"
security_result.summary = "NGIPS Severity:6"
security_result.action = "ALLOW"
security_result.severity = "INFORMATIONAL"
security_result.severity_details = "Informational message only"
network.sent_bytes = 72
network.received_bytes = 72
network.ip_protocol = "ICMP"
Parser Alerting¶
Alerting criteria is listed in the Product Event Types table above.
Rules¶
Coming Soon