logstash-input-sdee 0.6.9 → 0.7.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA1:
3
- metadata.gz: 2e5c47c9f0d817a1e1d1fbb697e896ffc7fe0ef4
4
- data.tar.gz: 6df5bb5d6942b4554216a032379a4ecf00989573
3
+ metadata.gz: a309cfe8bdd6daec2c0e3abe3b2ce8378eaaecf0
4
+ data.tar.gz: 538f3991ba62d609540830549fcc58f4e24e1659
5
5
  SHA512:
6
- metadata.gz: 5ef8b0e84db55e36509d00af50cd6134b642ee4ee051c3a07f102cdf86af3dd74fcc217d5877e5451e6251b76a8e1ccb41d14135860955bd7c7fab174540f082
7
- data.tar.gz: de12fddd14935ebd9b8e377cd64b605f544ec5b9f8dc354999d7414b1496e8c4a9f76c8116db1a00691723a6866629146d3b3b31c43a04c39e5b37665794488d
6
+ metadata.gz: f7756854ba4d3c0532c74f04f7672f6eba87f56c33fc9c85ace7c2f14f0031003e33845f85564d4e306badd4d1068eb9309819427c0546ef431cee24be5dab69
7
+ data.tar.gz: d5b12d693b98aa61ab37789d8089091978fa92820680b85e8db4da32230dc635ee1faffeef368f9b8096ebf00140cc470351ac749b2b4b594c441751ea90b7bb
data/CHANGELOG.md CHANGED
@@ -1,3 +1,6 @@
1
+ * 0.7.0
2
+ - logstash configuration examples, inputs and filter
3
+ - pattern file and dictioanries for Cisco IPS messages
1
4
  * 0.6.9
2
5
  - making it ready for RubyGems
3
6
  * 0.4.0
@@ -27,9 +27,3 @@ input {
27
27
  }
28
28
 
29
29
  }
30
-
31
- output {
32
- stdout {
33
- codec => rubydebug
34
- }
35
- }
@@ -0,0 +1,57 @@
1
+ filter {
2
+ if ([type] and ([type] == "syslog-relay") and !("_grokparsefailure" in [tags]) and !("pre-processed" in [tags])) {
3
+ grok {
4
+ match => {
5
+ "message" => "%{GREEDYDATA:cisco_message}"
6
+ }
7
+ add_tag => [ "parser_begin" ]
8
+ }
9
+ grok {
10
+ patterns_dir => [ "/etc/logstash/patterns" ]
11
+ match => {
12
+ "message" => "%{CTIMESTAMP}( %{SYSLOGHOST:host})? (?:%{INT:sequence}: %{MONTH} %{MONTHDAY} %{HOUR}:%{MINUTE}:%{SECOND}\.[0-9]+: )%{GREEDYDATA:message}"
13
+ }
14
+ overwrite => [ "message" ]
15
+ add_tag => [ "pre-processed" ]
16
+ add_field => {
17
+ "vendor" => "Cisco"
18
+ "device" => "SW or Router"
19
+ }
20
+ }
21
+ grok {
22
+ patterns_dir => [ "/etc/logstash/patterns" ]
23
+ match => {
24
+ "message" => "%{CISCO_TAG}: %{GREEDYDATA:message}"
25
+ }
26
+ overwrite => [ "message" ]
27
+ }
28
+ if [cisco_facility] {
29
+ translate {
30
+ field => "cisco_facility"
31
+ destination => "facility"
32
+ dictionary_path => [ "/etc/logstash/patterns/cisco.facility" ]
33
+ override => true
34
+ remove_field => [cisco_facility]
35
+ }
36
+ }
37
+ if [cisco_severity] {
38
+ translate {
39
+ field => "cisco_severity"
40
+ destination => "severity"
41
+ dictionary => [
42
+ "0", "Emergency",
43
+ "1", "Alert",
44
+ "2", "Critical",
45
+ "3", "Error",
46
+ "4", "Warning",
47
+ "5", "Notification",
48
+ "6", "Informational",
49
+ "7", "Debugging" ]
50
+ override => true
51
+ remove_field => [cisco_severity]
52
+ }
53
+ }
54
+
55
+ }
56
+ }
57
+
@@ -0,0 +1,5 @@
1
+ output {
2
+ stdout {
3
+ codec => rubydebug
4
+ }
5
+ }
@@ -1,79 +1,133 @@
1
1
  #== Cisco ASA ==
2
2
  HOSTNAME \b(?:[_0-9A-Za-z][_0-9A-Za-z-]{0,62})(?:\.(?:[_0-9A-Za-z][_0-9A-Za-z-]{0,62}))*(\.?|\b)
3
- CTIMESTAMP %{YEAR}-%{MONTHNUM2}-%{MONTHDAY}[T ]%{HOUR}:?%{MINUTE}(?::?%{SECOND})?%{ISO8601_TIMEZONE}?
4
- CISCO_TAGGED %{CTIMESTAMP:ctimestamp}( %{SYSLOGHOST:sysloghost})? %{CISCO_TAG:ciscotag}:
5
- CISCO_TAG %[A-Z0-9]+-%{INT:cisco_severity}-(?:[A-Z0-9_]+)|WLC[0-9]+
3
+ CTIMESTAMP %{YEAR}-%{MONTHNUM2}-%{MONTHDAY}[T ]%{HOUR}:?%{MINUTE}(?::?%{SECOND})(?:\.[0-9]+)?%{ISO8601_TIMEZONE}
4
+ CISCO_TAGGED %{CTIMESTAMP}( %{SYSLOGHOST:host})? %{CISCO_TAG:ciscotag}:
5
+ CISCO_ASA_TAGGED %{CTIMESTAMP}( %{SYSLOGHOST:host})? %{CISCO_ASA_TAG:ciscotag}:
6
+ CISCO_CLASS [0-9]{3}
7
+ CISCO_STRUC [A-Z0-9_]+
8
+ CISCO_TAG %{CISCO_STRUC:cisco_facility}-%{INT:cisco_severity}-%{CISCO_STRUC:cisco_mnemonic}|WLC[0-9]+
9
+ CISCO_ASA_TAG %[A-Z0-9_]+-%{INT:cisco_severity}-%{CISCO_CLASS:cisco_class}[0-9]{3}
6
10
  # Common Particles
7
- CISCO_ASA_ACTION Built|Teardown|Deny|Denied|denied|requested|permitted|received|denied by ACL|discarded|est-allowed|Dropping|created|deleted|SENDING|RECEIVED|monitored|dropped
8
- CISCO_ASA_REASON Duplicate TCP SYN|TCP Reset\-O|Failed to locate egress interface|Invalid transport field|No matching connection|DNS Response|DNS Query|(?:%{WORD}\s*)*
11
+ CISCO_ASA_ACTION Built|Teardown|Deny|Denied|denied|requested|permitted|received|denied by ACL|discarded|est-allowed|Dropping|dropping|created|deleted|SENDING|RECEIVED|monitored|dropped|terminated|Rejected
12
+ CISCO_ASA_REASON AAA failure|Duplicate TCP SYN|TCP Reset\-O|Failed to locate egress interface|Invalid transport field|No matching connection|DNS Response|DNS Query|(?:%{WORD}\s*)*
9
13
  CISCO_ASA_DIRECTION Inbound|inbound|Outbound|outbound
10
14
  CISCO_ASA_INTERVAL first hit|%{INT}-second interval
11
15
  CISCO_ASA_XLATE_TYPE static|dynamic
12
16
  # ASA-2-106001
13
- CISCOASA106001 %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} connection %{CISCO_ASA_ACTION:action} from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port} flags %{GREEDYDATA:tcp_flags} on interface %{GREEDYDATA:interface}
17
+ CISCOASA106001 %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} connection %{DATA:action} from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port} flags %{GREEDYDATA:tcp_flags} on interface %{GREEDYDATA:interface}
14
18
  # ASA-2-106006, ASA-2-106007, ASA-2-106010
15
- CISCOASA106006_106007_106010 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} (?:from|src) %{IP:src_ip}/%{INT:src_port}(\(%{DATA:src_fwuser}\))? (?:to|dst) %{IP:dst_ip}/%{INT:dst_port}(\(%{DATA:dst_fwuser}\))? (?:on interface %{DATA:interface}|due to %{CISCO_ASA_REASON:reason})
19
+ CISCOASA106006_106007_106010 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} (?:from|src) %{IP:src_ip}/%{INT:src_port}(\(%{DATA:src_user}\))? (?:to|dst) %{IP:dst_ip}/%{INT:dst_port}(\(%{DATA:dst_user}\))? (?:on interface %{DATA:interface}|due to %{CISCO_ASA_REASON:reason})
16
20
  # ASA-3-106014
17
- CISCOASA106014 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} src %{DATA:src_interface}:%{IP:src_ip}(\(%{DATA:src_fwuser}\))? dst %{DATA:dst_interface}:%{IP:dst_ip}(\(%{DATA:dst_fwuser}\))? \(type %{INT:icmp_type}, code %{INT:icmp_code}\)
21
+ CISCOASA106014 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_DIRECTION:direction} %{WORD:protocol} src %{DATA:src_interface}:%{IP:src_ip}(\(%{DATA:src_user}\))? dst %{DATA:dst_interface}:%{IP:dst_ip}(\(%{DATA:dst_user}\))? \(type %{INT:icmp_type}, code %{INT:icmp_code}\)
18
22
  # ASA-6-106015
19
23
  CISCOASA106015 %{CISCO_ASA_ACTION:action} %{WORD:protocol} \(%{DATA:policy_id}\) from %{IPORHOST:src_ip}/%{INT:src_port} to %{IPORHOST:dst_ip}/%{INT:dst_port} flags %{DATA:tcp_flags} on interface %{GREEDYDATA:interface}
20
24
  # ASA-1-106021
21
25
  CISCOASA106021 %{CISCO_ASA_ACTION:action} %{WORD:protocol} reverse path check from %{IP:src_ip} to %{IP:dst_ip} on interface %{GREEDYDATA:interface}
22
26
  # ASA-4-106023
23
- CISCOASA106023 %{CISCO_ASA_ACTION:action} %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_fwuser}\))? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(\(%{DATA:dst_fwuser}\))?( \(type %{INT:icmp_type}, code %{INT:icmp_code}\))? by access-group %{DATA:policy_id} \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
27
+ CISCOASA106023 %{CISCO_ASA_ACTION:action} %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_user}\))? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(\(%{DATA:dst_user}\))?( \(type %{INT:icmp_type}, code %{INT:icmp_code}\))? by access-group "%{DATA:policy_id}" \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
24
28
  # ASA-5-106100
25
- CISCOASA106100 access-list %{WORD:policy_id} %{CISCO_ASA_ACTION:action} %{WORD:protocol} %{DATA:src_interface}/%{IP:src_ip}\(%{INT:src_port}\)(\(%{DATA:src_fwuser}\))? -> %{DATA:dst_interface}/%{IP:dst_ip}\(%{INT:dst_port}\)(\(%{DATA:src_fwuser}\))? hit-cnt %{INT:hit_count} %{CISCO_ASA_INTERVAL:interval} \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
29
+ CISCOASA106100 access-list %{WORD:policy_id} %{CISCO_ASA_ACTION:action} %{WORD:protocol} %{DATA:src_interface}/%{IP:src_ip}\(%{INT:src_port}\)(\(%{DATA:src_user}\))? -> %{DATA:dst_interface}/%{IP:dst_ip}\(%{INT:dst_port}\)(\(%{DATA:dst_user}\))? hit-cnt %{INT:hit_count} %{CISCO_ASA_INTERVAL:interval} \[%{DATA:hashcode1}, %{DATA:hashcode2}\]
26
30
  # ASA-6-110002
27
31
  CISCOASA110002 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
28
32
  # ASA-5-111008
29
- CISCOASA111008 User \'%{DATA:src_fwuser}\' executed the \'%{GREEDYDATA:cmd}\' command\.
33
+ CISCOASA111008 User '%{DATA:user}' executed the '%{GREEDYDATA:cmd}' command\.
30
34
  # ASA-7-111009
31
- CISCOASA111009 User \'%{DATA:src_fwuser}\' executed cmd: %{GREEDYDATA:cmd}
35
+ CISCOASA111009 User '%{DATA:user}' executed cmd: %{GREEDYDATA:cmd}
32
36
  # ASA-5-111010
33
- CISCOASA111010 User \'%{DATA:src_fwuser}\', running \'CLI\' from IP %{IPORHOST:src_ip}, executed \'%{GREEDYDATA:cmd}\'
37
+ CISCOASA111010 User '%{DATA:user}', running '%{WORD:service}' from IP %{IPORHOST:src_ip}, executed '%{GREEDYDATA:cmd}'
38
+ # ASA-6-113004
39
+ CISCOASA113004 AAA user authentication Successful : server = \s*%{IPORHOST:server} : user = %{DATA:user}
40
+ # ASA-6-113005
41
+ CISCOASA113005 AAA user authentication %{CISCO_ASA_ACTION:action} : reason = %{CISCO_ASA_REASON} : server = %{IPORHOST:server} : user = %{DATA:user} : user IP = %{IP:src_ip}
42
+ # ASA-6-113008
43
+ CISCOASA113008 AAA transaction status ACCEPT : user = %{DATA:user}
44
+ # ASA-6-113009
45
+ CISCOASA113009 AAA retrieved default group policy \(%{DATA:policy}\) for user = %{DATA:user}
46
+ # ASA-6-302004
47
+ CISCOASA302004 Pre-allocate %{DATA:protocol} backconnection for faddr %{IPORHOST:orig_src_ip}(?:/%{INT:orig_src_port})? to laddr %{IPORHOST:orig_src_ip}(?:/%{INT:orig_src_port})?
34
48
  # ASA-6-302010
35
49
  CISCOASA302010 %{INT:connection_count} in use, %{INT:connection_count_max} most used
36
50
  # ASA-6-302013, ASA-6-302014, ASA-6-302015, ASA-6-302016
37
- CISCOASA302013_302014_302015_302016 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection %{INT:connection_id} for %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port}( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))?(\(%{DATA:src_fwuser}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port}( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?(\(%{DATA:dst_fwuser}\))?( duration %{TIME:duration} bytes %{INT:bytes})?(?: %{CISCO_ASA_REASON:reason})?( \(%{DATA:user}\))?
51
+ CISCOASA302013_302014_302015_302016 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection %{INT:connection_id} for %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port}( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))?(\(%{DATA:src_user}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port}( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?(\(%{DATA:dst_user}\))?( duration %{TIME:duration} bytes %{INT:bytes})?(?: %{CISCO_ASA_REASON:reason})?( \(%{DATA:user}\))?
38
52
  # ASA-6-302020, ASA-6-302021
39
- CISCOASA302020_302021 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection for faddr %{IPORHOST:dst_ip}/%{INT:icmp_seq_num}(?:\(%{DATA:fwuser}\))? gaddr %{IPORHOST:src_xlated_ip}/%{INT:icmp_code_xlated} laddr %{IPORHOST:src_ip}/%{INT:icmp_code}( \(%{DATA:user}\))?
53
+ CISCOASA302020_302021 %{CISCO_ASA_ACTION:action}(?: %{CISCO_ASA_DIRECTION:direction})? %{WORD:protocol} connection for faddr %{IPORHOST:dst_ip}/%{INT:icmp_seq_num}(?:\(%{DATA:user}\))? gaddr %{IPORHOST:src_xlated_ip}/%{INT:icmp_code_xlated} laddr %{IPORHOST:src_ip}/%{INT:icmp_code}( \(%{DATA:user}\))?
54
+ # ASA-6-303002
55
+ CISCOASA303002 FTP connection from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?, user %{DATA:user} %{WORD:action} file %{DATA:filename}
40
56
  # ASA-3-305006
41
57
  CISCOASA305006 regular translation creation failed for %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?(?: \(type %{INT:icmp_type}, code %{INT:icmp_code}\))?
42
58
  # ASA-6-305011
43
- CISCOASA305011 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_XLATE_TYPE:xlate_type} %{WORD:protocol} translation from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_fwuser}\))? to %{DATA:src_xlated_interface}:%{IPORHOST:src_xlated_ip}/%{DATA:src_xlated_port}
59
+ CISCOASA305011 %{CISCO_ASA_ACTION:action} %{CISCO_ASA_XLATE_TYPE:xlate_type} %{WORD:protocol} translation from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?(\(%{DATA:src_user}\))? to %{DATA:src_xlated_interface}:%{IPORHOST:src_xlated_ip}/%{DATA:src_xlated_port}
44
60
  # ASA-5-305013
45
61
  CISCOASA305013 Asymmetric NAT rules matched for forward and reverse flows; Connection for %{WORD:protocol} src %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? dst %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})? %{CISCO_ASA_ACTION:action} due to NAT reverse path failure
46
62
  # ASA-3-313001, ASA-3-313004, ASA-3-313008
47
63
  CISCOASA313001_313004_313008 %{CISCO_ASA_ACTION:action} %{WORD:protocol} type=%{INT:icmp_type}, code=%{INT:icmp_code} from %{IP:src_ip} on interface %{DATA:interface}( to %{IP:dst_ip})?
48
64
  # ASA-4-313005
49
- CISCOASA313005 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} error message: %{WORD:err_protocol} src %{DATA:err_src_interface}:%{IPORHOST:err_src_ip}(\(%{DATA:err_src_fwuser}\))? dst %{DATA:err_dst_interface}:%{IPORHOST:err_dst_ip}(\(%{DATA:err_dst_fwuser}\))? \(type %{INT:err_icmp_type}, code %{INT:err_icmp_code}\) on %{DATA:interface} interface\. Original IP payload: %{WORD:protocol} src %{IPORHOST:orig_src_ip}/%{INT:orig_src_port}(\(%{DATA:orig_src_fwuser}\))? dst %{IPORHOST:orig_dst_ip}/%{INT:orig_dst_port}(\(%{DATA:orig_dst_fwuser}\))?
65
+ CISCOASA313005 %{CISCO_ASA_REASON:reason} for %{WORD:protocol} error message: %{WORD:err_protocol} src %{DATA:err_src_interface}:%{IPORHOST:err_src_ip}(\(%{DATA:err_src_user}\))? dst %{DATA:err_dst_interface}:%{IPORHOST:err_dst_ip}(\(%{DATA:err_dst_user}\))? \(type %{INT:err_icmp_type}, code %{INT:err_icmp_code}\) on %{DATA:interface} interface\. Original IP payload: %{WORD:protocol} src %{IPORHOST:orig_src_ip}/%{INT:orig_src_port}(\(%{DATA:orig_src_user}\))? dst %{IPORHOST:orig_dst_ip}/%{INT:orig_dst_port}(\(%{DATA:orig_dst_user}\))?
66
+ # ASA-4-313004
67
+ #CISCOASA338004 Denied ICMP type=%{INT:icmp_type}, from laddr %{IPORHOST:src_ip} on interface %{DATA:src_interface} to %{IPORHOST:dst_ip}: no matching session
50
68
  # ASA-4-338004, ASA-4-338008
51
69
  CISCOASA338004_338008 Dynamic Filter %{CISCO_ASA_ACTION:action} blacklisted %{WORD:protocol} traffic from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?, destination %{IPORHOST:blacklisted_ip} resolved from local list: %{IPORHOST:blacklisted_ip}/%{IPORHOST:blacklisted_netmask}, threat-level: %{DATA:threat_level}, category: %{DATA:category}
52
70
  # ASA-4-338008 Dynamic Filter %{CISCO_ASA_ACTION:action} blacklisted %{WORD:protocol} traffic from %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})?( \(%{IPORHOST:src_mapped_ip}/%{INT:src_mapped_port}\))? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})?( \(%{IPORHOST:dst_mapped_ip}/%{INT:dst_mapped_port}\))?, destination %{IPORHOST:blacklisted_ip} resolved from local list: 221.204.186.0/255.255.255.0, threat-level: very-high, category: admin-added
71
+ # ASA-6-338304
72
+ CISCOASA338304 Successfully downloaded dynamic filter data file from updater server %{DATA:url}
73
+ # ASA-4-400013
74
+ CISCOASA400013 IDS:2003 ICMP redirect from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
75
+ # ASA-4-400028
76
+ CISCOASA400028 IDS:3042 TCP FIN only flags from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
77
+ # ASA-4-400037
78
+ CISCOASA400037 IDS:6053 DNS all records request from %{IPORHOST:src_ip} to %{IPORHOST:dst_ip} on interface %{DATA:interface}
53
79
  # ASA-4-402117
54
80
  CISCOASA402117 %{WORD:protocol}: Received a non-IPSec packet \(protocol= %{WORD:orig_protocol}\) from %{IP:src_ip} to %{IP:dst_ip}
55
81
  # ASA-4-402119
56
82
  CISCOASA402119 %{WORD:protocol}: Received an %{WORD:orig_protocol} packet \(SPI= %{DATA:spi}, sequence number= %{DATA:seq_num}\) from %{IP:src_ip} \(user= %{DATA:user}\) to %{IP:dst_ip} that failed anti-replay checking
83
+ # ASA-4-405104
84
+ CISCOASA405104 %{WORD:protocol} message %{DATA:voip_message} received from %{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_ip}(/%{INT:dst_port})? before SETUP
57
85
  # ASA-4-419001
58
86
  CISCOASA419001 %{CISCO_ASA_ACTION:action} %{WORD:protocol} packet from %{DATA:src_interface}:%{IP:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IP:dst_ip}/%{INT:dst_port}, reason: %{GREEDYDATA:reason}
59
87
  # ASA-4-419002
60
88
  CISCOASA419002 %{CISCO_ASA_REASON:reason} from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port} with different initial sequence number
61
89
  # ASA-4-500004
62
90
  CISCOASA500004 %{CISCO_ASA_REASON:reason} for protocol=%{WORD:protocol}, from %{IP:src_ip}/%{INT:src_port} to %{IP:dst_ip}/%{INT:dst_port}
91
+ # ASA-5-502103
92
+ CISCOASA502103 User priv level changed: Uname: %{DATA:user} From: %{INT:from_level} To: %{INT:to_level}
93
+ # ASA-4-507003
94
+ CISCOASA507003 %{WORD:protocol} flow from %{DATA:src_interface}:%{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{INT:dst_port} %{CISCO_ASA_ACTION:action} by inspection engine, reason - %{DATA:reason}?\.
63
95
  # ASA-6-602303, ASA-6-602304
64
96
  CISCOASA602303_602304 %{WORD:protocol}: An %{CISCO_ASA_DIRECTION:direction} %{GREEDYDATA:tunnel_type} SA \(SPI= %{DATA:spi}\) between %{IP:src_ip} and %{IP:dst_ip} \(user= %{DATA:user}\) has been %{CISCO_ASA_ACTION:action}
97
+ # ASA-6-605005
98
+ CISCOASA605005 Login permitted from %{IPORHOST:src_ip}/%{INT:src_port} %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{WORD:dst_port} for user "%{DATA:user}"
99
+ # ASA-6-607001
100
+ CISCOASA607001 Pre-allocate %{GREEDYDATA:protocol} secondary channel for %{DATA:src_interface}:%{IPORHOST:src_ip}(/%{INT:src_port})? to %{DATA:dst_interface}:%{IPORHOST:dst_ip}(/%{INT:dst_port})? from %{DATA:voip_message} message
65
101
  # ASA-7-609001, ASA-7-609002
66
102
  CISCOASA609001_609002 %{CISCO_ASA_ACTION:action} local-host %{DATA:src_interface}:%{IPORHOST:src_ip}(?: duration %{TIME:duration})?
103
+ # ASA-6-611101
104
+ CISCOASA611101 User authentication succeeded: Uname: %{DATA:user}
67
105
  # ASA-7-710001, ASA-7-710002, ASA-7-710003, ASA-7-710005, ASA-7-710006
68
106
  CISCOASA710001_710002_710003_710005_710006_710007 %{WORD:protocol} (?:request|access|keepalive) %{CISCO_ASA_ACTION:action} from %{IPORHOST:src_ip}/%{INT:src_port} to %{DATA:dst_interface}:%{IPORHOST:dst_ip}/%{DATA:dst_port}
69
107
  # ASA-6-713172
70
108
  CISCOASA713172 Group = %{GREEDYDATA:group}, IP = %{IP:src_ip}, Automatic NAT Detection Status:\s+Remote end\s*%{DATA:is_remote_natted}\s*behind a NAT device\s+This\s+end\s*%{DATA:is_local_natted}\s*behind a NAT device
71
109
  # ASA-7-713236
72
110
  CISCOASA713236 IP = %{IPORHOST:src_ip}, IKE_DECODE %{CISCO_ASA_ACTION} Message \(msgid=%{DATA:msgid}\) with payloads : %{GREEDYDATA:payload} total length : %{INT:length}
111
+ # ASA-5-713257
112
+ CISCOASA713257 Phase %{DATA} failure: Mismatched attribute types for class %{DATA:vpn_class}: Rcv'd: %{DATA:vpn_rcvd} Cfg'd: %{DATA:vpn_cfgd}
113
+ # ASA-5-713904
114
+ CISCOASA713904 IP = %{IPORHOST:src_ip}, Received encrypted packet with no matching SA, %{CISCO_ASA_ACTION:action}
73
115
  # ASA-7-713906
74
116
  CISCOASA713906 IKE Receiver: Packet received on %{IPORHOST:dst_ip}:%{INT:dst_port} from %{IPORHOST:src_ip}:%{INT:src_port}
75
117
  # ASA-7-715046
76
- CISCOASA715036_715046_715047_715075 Group = %{GREEDYDATA:group},(?: Username = %{DATA:src_fwuser},)? IP = %{IP:src_ip},%{GREEDYDATA:vpn_action}
118
+ CISCOASA715036_715046_715047_715075 Group = %{GREEDYDATA:group},(?: Username = %{DATA:user},)? IP = %{IP:src_ip},%{GREEDYDATA:vpn_action}
77
119
  # ASA-4-733100
78
120
  CISCOASA733100 \[\s*%{DATA:drop_type}\s*\] drop %{DATA:drop_rate_id} exceeded. Current burst rate is %{INT:drop_rate_current_burst} per second, max configured rate is %{INT:drop_rate_max_burst}; Current average rate is %{INT:drop_rate_current_avg} per second, max configured rate is %{INT:drop_rate_max_avg}; Cumulative total count is %{INT:drop_total_count}
121
+ # ASA-6-734001
122
+ CISCOASA734001 DAP: User %{DATA:user}, Addr %{IP:src_ip}, Connection %{DATA:protocol}: The following DAP records were selected for this connection: %{GREEDYDATA:policy_id}
123
+ # ASA-6-737006
124
+ CISCOASA737006 IPAA: Local pool request succeeded for tunnel-group '%{DATA:vpn_group}'
125
+ # ASA-6-737016
126
+ CISCOASA737016 IPAA: Freeing local pool address %{IP:src_ip}
127
+ # ASA-6-737026
128
+ CISCOASA737026 IPAA: Client assigned %{IP:src_ip} from local pool
129
+ # ASA-6-737029
130
+ CISCOASA737029 IPAA: Added %{IP:src_ip} to standby
131
+ # ASA-6-737031
132
+ CISCOASA737031 IPAA: Removed %{IP:src_ip} from standby
79
133
  #== End Cisco ASA ==
@@ -0,0 +1,131 @@
1
+ "101": High Availability (Failover)
2
+ "102": High Availability (Failover)
3
+ "103": High Availability (Failover)
4
+ "104": High Availability (Failover)
5
+ "105": High Availability (Failover)
6
+ "106": Access Lists
7
+ "107": RIP Routing
8
+ "108": User Session
9
+ "109": User Authentication
10
+ "110": Transparent Firewall
11
+ "111": Command Interface
12
+ "112": Command Interface
13
+ "113": User Authentication
14
+ "120": Smart Call Home
15
+ "199": System
16
+ "201": User Session
17
+ "202": User Session
18
+ "204": User Session
19
+ "208": Command Interface
20
+ "209": IP Stack
21
+ "210": High Availability (Failover)
22
+ "211": System
23
+ "212": SNMP
24
+ "213": PPTP and L2TP Sessions
25
+ "214": System
26
+ "215": IP Stack
27
+ "216": System
28
+ "220": Transparent Firewall
29
+ "302": User Session
30
+ "303": User Session
31
+ "304": User Session
32
+ "305": NAT and PAT
33
+ "306": System
34
+ "307": System
35
+ "308": Command Interface
36
+ "311": High Availability (Failover)
37
+ "312": RIP Routing
38
+ "313": IP Stack
39
+ "314": User Session
40
+ "315": System
41
+ "316": IKE and IPSec
42
+ "317": IP Stack
43
+ "318": OSPF Routing
44
+ "319": Network Processor
45
+ "320": IKE and IPSec
46
+ "321": Resource Manager
47
+ "325": IPv6
48
+ "321": Resource Manager
49
+ "323": Card Management
50
+ "333": EAP or EAPoUDP for NAC
51
+ "334": EAP or EAPoUDP for NAC
52
+ "336": EIGRP Routing
53
+ "337": Phone Proxy
54
+ "338": Blacklists, Whitelists, and Graylists
55
+ "339": UC-IME
56
+ "400": Intrusion Protection System
57
+ "401": Intrusion Protection System
58
+ "402": IKE and IPSec
59
+ "403": PPTP and L2TP Sessions
60
+ "404": IKE and IPSec
61
+ "405": User Session
62
+ "406": User Session
63
+ "407": User Session
64
+ "408": IP Stack
65
+ "409": OSPF Routing
66
+ "414": System
67
+ "415": Application Firewall
68
+ "419": Intrusion Protection System
69
+ "420": Intrusion Protection System
70
+ "444": Licensing
71
+ "500": User Session
72
+ "501": IKE and IPSec
73
+ "502": User Session
74
+ "503": OSPF Routing
75
+ "505": System
76
+ "602": IKE and IPSec
77
+ "603": PPTP and L2TP Sessions
78
+ "604": System
79
+ "605": System
80
+ "606": System
81
+ "607": User Session
82
+ "608": User Session
83
+ "609": User Session
84
+ "610": System
85
+ "611": VPN Client
86
+ "612": System
87
+ "613": OSPF Routing
88
+ "614": System
89
+ "615": System
90
+ "616": User Session
91
+ "620": User Session
92
+ "701": System
93
+ "702": IKE and IPSec
94
+ "703": User Session
95
+ "709": High Availability (Failover)
96
+ "710": User Session
97
+ "711": System
98
+ "713": Network Access Point
99
+ "714": IKE and IPSec
100
+ "715": IKE and IPSec
101
+ "716": WebVPN Client
102
+ "717": PKI Certification Authority
103
+ "718": VPN Load Balancing
104
+ "719": E-mail Proxy
105
+ "720": VPN Failover
106
+ "721": WebVPN Failover
107
+ "722": SSL VPN Client
108
+ "723": Citrix Client
109
+ "724": Secure Desktop
110
+ "725": SSL Stack
111
+ "727": High Availability (Failover)
112
+ "728": Load Balancing
113
+ "730": VLAN Mapping
114
+ "731": NAC Policy
115
+ "732": NAC Settings to apply NAC Policy
116
+ "733": Threat Detection
117
+ "734": Dynamic Access Policies
118
+ "735": IP Address Assignment
119
+ "737": IP Address Assignment
120
+ "741": System
121
+ "742": Password Encryption
122
+ "746": Identity-based Firewall
123
+ "747": Clustering
124
+ "750": IKEv2 Toolkit
125
+ "751": IKEv2 Toolkit
126
+ "752": IKEv2 Toolkit
127
+ "775": ScanSafe
128
+ "776": Cisco TrustSec
129
+ "778": VXLAN
130
+ "779": Service Tag Switching
131
+ "802": MDM Proxy
@@ -0,0 +1,82 @@
1
+ AUTHMGR: Authentication manager
2
+ ACLMGR: ACL manager
3
+ BACKUP_INTERFACE: Flex Links
4
+ BADTRANSCEIVER: Defective transceiver
5
+ BSPATCH: Boot loader patch
6
+ CFGMGR: Configuration manager
7
+ CLS_ACC: Consoleless access
8
+ CMP: Cluster Membership Protocol
9
+ DHCP_SNOOPING: DHCP snooping
10
+ DOT1X: 802.1x
11
+ DOT1X_SWITCH: 802.1x for switches
12
+ DTP: Dynamic Trunking Protocol
13
+ DWL: Down-when-looped
14
+ EC: EtherChannel
15
+ ENVIRONMENT: Environment Messages
16
+ EPM: Enforcement Policy Module
17
+ ETHCNTR: Ethernet controller
18
+ EXPRESS_SETUP: Express Setup
19
+ FRNTEND_CTRLR: Front-end controller
20
+ GBIC_SECURITY: GBIC and SFP module security
21
+ GBIC_SECURITY_CRYPT: GBIC and SFP module security
22
+ GBIC_SECURITY_UNIQUE: GBIC and SFP module security
23
+ HARDWARE: Hardware
24
+ LFM: Local forwarding manager
25
+ HPSECURE: Port security
26
+ HULC_LICENSE: Licensing
27
+ IFMGR: Interface manager
28
+ IGMP_QUERIER: IGMP querier
29
+ ILET: Cisco IOS License Enforcement Test
30
+ ILPOWER: PoE
31
+ IMAGEMGR: Image manager
32
+ IP: Internet Protocol
33
+ IP_DEVICE_TRACKING: IP device tracking
34
+ KEYMAN: Keyman Messages
35
+ MAC_MOVE: Host activity
36
+ PAGP: Port Aggregation Protocol
37
+ PHY: PHY
38
+ PIMSN: PIM snooping
39
+ PLATFORM: Low-level platform-specific
40
+ PLATFORM_SM10G: Platform FRULink 10G Service Module
41
+ PLATFORM_ENV: Platform environment
42
+ PLATFORM_FBM: Platform fallback bridging manager
43
+ PLATFORM_HCEF: Cisco Express Forwarding
44
+ PLATFORM_HPLM: Platform pseudo-label manager
45
+ PLATFORM_IPC: Platform Interprocess Communication Protocol
46
+ PLATFORM_IPv6_UCAST: IP Version 6 Unicast
47
+ PLATFORM_PBR: Platform policy-based routing
48
+ PLATFORM_PM: Platform port manager
49
+ PLATFORM_RPC: Platform remote procedure call
50
+ PLATFORM_SPAN: Platform switched port analyzer
51
+ PLATFORM_STACKPOWER: Platform stack power
52
+ PLATFORM_UCAST: Platform unicast routing
53
+ PLATFORM_VLAN: Platform VLAN
54
+ PLATFORM_WCCP: Platform WCCP
55
+ PM: Port manager
56
+ PORT_SECURITY: Port security
57
+ POWERNET_ISSU: EnergyWise domain
58
+ PT: Protocol tunneling
59
+ QOSMGR: QoS manager
60
+ RMON: Remote Network Monitoring (RMON)
61
+ SCHED: Schedule
62
+ SDM: Switch Database Manager
63
+ SESA: SESA
64
+ SPAN: Switched port analyzer
65
+ SPANTREE: Spanning tree
66
+ SPANTREE_FAST: Spanning-tree fast convergence
67
+ SPANTREE_VLAN_SW: Spanning-tree VLAN switch
68
+ STACKMGR: Stack manager
69
+ STORM_CONTROL: Storm control
70
+ SUPERVISOR: Supervisor ASIC
71
+ SUPQ: Supervisor queue
72
+ SW_DAI: Dynamic ARP inspection
73
+ SW_MACAUTH: MAC address authentication
74
+ SW_MATM: MAC address table manager
75
+ SW_VLAN: VLAN manager
76
+ SW_QOS_TB: QoS trusted boundary
77
+ TCAMMGR: Ternary content addressable memory manager
78
+ UDLD: UniDirectional Link Detection
79
+ UFAST_MCAST_SW: UplinkFast packet transmission
80
+ VLMAPLOG: VLAN Access Map Logs
81
+ VQPCLIENT: VLAN Query Protocol client
82
+ WCCP: WCCP
@@ -1,6 +1,6 @@
1
1
  Gem::Specification.new do |s|
2
2
  s.name = 'logstash-input-sdee'
3
- s.version = '0.6.9'
3
+ s.version = '0.7.0'
4
4
  s.date = '2016-08-14'
5
5
  s.summary = "Logstah SDEE input from Cisco ASA"
6
6
  s.description = "This Logstash input plugin allows you to call a Cisco SDEE/CIDEE HTTP API, decode the output of it into event(s), and send them on their merry way."
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: logstash-input-sdee
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.6.9
4
+ version: 0.7.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - rootik
@@ -102,8 +102,12 @@ files:
102
102
  - Gemfile
103
103
  - LICENSE
104
104
  - README.md
105
+ - examples/10-inputs.conf
106
+ - examples/20-filter.conf
107
+ - examples/30-outputs.conf
105
108
  - examples/patterns/cisco
106
- - examples/sdee.conf
109
+ - examples/patterns/cisco.dictionary
110
+ - examples/patterns/cisco.facility
107
111
  - lib/logstash/inputs/sdee.rb
108
112
  - logstash-input-sdee.gemspec
109
113
  homepage: http://rubygems.org/gems/logstash-input-sdee