Here's the entire thing...
local_rules.xml - adjust rule ids accordingly...
<group name="syslog,cisco-cx,">
<rule id="100198" level="0">
<decoded_as>cisco-cx</decoded_as>
<description>Cisco CX Flows.</description>
</rule>
<rule id="100199" level="10">
<if_sid>100198</if_sid>
<match>Deny</match>
<description>Flow Denied</description>
</rule>
</group>
local_decoder.xml -----
<decoder name="cisco-cx">
<prematch>^\d\s\d\d\d\d-\d\d-\d\d\w\d\d:\d\d:\d\d.\d\d\dZ\s\d+.\d+.\d+.\d+\sCiscoNGFW\s\d\d\d\d\s</prematch>
</decoder>
<decoder name="cisco-cxalert">
<parent>cisco-cx</parent>
<prematch offset="after_parent">^1|^2|^3|^4|^5</prematch>
<regex
offset="after_parent">\.+Flow_DstIp=\p(\d+.\d+.\d+.\d+)\p\.+Flow_SrcIp="(\d+.\d+.\d+.\d+)"\.+Url_Category_Name="(\w+\s*\w*\s*\w*\s*\w*)"
\.+Url="(\.+)"\.*</regex>
<order>dstip,srcip,extra_data,url,action</order>
</decoder>
<decoder name="cisco-cxalert2">
<parent>cisco-cx</parent>
<prematch offset="after_parent">^6|^7|^8|^9|^10</prematch>
<regex
offset="after_parent">^\.+Web_Reputation_Threat_Type="(\w+\s*\w*\s*\w*\s*\w*)"\.*Event_Type_Name="(\w+\s*\w*\s*\w*\s*\w*)"
User_Realm="(\w+\p*\w*\p*\w*\p*\w*)"\.+Event_Type_Action="\w+"\.*Policy_Deny_Reason_Name="(\w+\s*\w*)"\.*</regex>
<order>status,action,user,extra_data</order>
</decoder>
it still needs some tweaking... if anyone out there (*listens for
crickets*) has a Cisco CX product and wants to test its syslog
abilities.....
On Tuesday, January 27, 2015 at 4:18:38 PM UTC-8, Brent Morris wrote:
> Hi...
>
> I am curious if anyone is using a Cisco NGFW with Cisco PRSM ???? I'd
> love to get a little input on these and perhaps see what logs look like
> from other Cisco NFGW devices with PRSM.
>
> And if you are using this firewall, would you help in testing the syslog
> feature of PRSM to OSSEC?
>
> Here are the decodes to add to your local_decode.xml - it's not complete
> yet...
>
> <decoder name="cisco-cx">
>
> <prematch>^\d\s\d\d\d\d-\d\d-\d\d\w\d\d:\d\d:\d\d.\d\d\dZ\s\d+.\d+.\d+.\d+\sCiscoNGFW\s\d\d\d\d\s</prematch>
> </decoder>
>
>
> <decoder name="cisco-cxalert">
> <parent>cisco-cx</parent>
> <prematch offset="after_parent">^1|2|3|4</prematch>
> <regex
> offset="after_parent">\.+Flow_DstIp=\p(\d+.\d+.\d+.\d+)\p\.+Flow_SrcIp="(\d+.\d+.\d+.\d+)"\.+Url_Category_Name="(\w+\s*\w*\s*\w*\s*\w*)"
>
> \.+Url="(\.+)"\.*</regex>
> <order>dstip,srcip,extra_data,url,action</order>
> </decoder>
>
>
> The second sample below throws an Rule: 1002 fired (level 2) -> "Unknown
> problem somewhere in the system." - Bad words are all over that one... I am
> not sure how to work around it right now and there are too many
> interruptions to wrap my head around it.
>
> Cisco won't give me their secret formula for the logs, so I'm forced to
> try to figure it out on my own. Near as I can tell... the number X
> in "CiscoNGFW 2827 X" is significant as to what type of log it is. You can
> see where I've tried to prematch that number.... 6 seems to be denied
> transactions... while 1-5 are setup, complete, and teardown flows.
>
> sample logs:
>
> 1 2015-01-22T23:16:02.783Z 1.2.3.23 CiscoNGFW 2827 5 [ngfwEvent@9
> Http_Response_Status="200" Flow_Dst_Service="tcp/80" Flow_Bytes_Sent="317"
> Flow_Bytes_Received="36718" Event_Type="0" Count="1"
> Flow_DstIp="184.25.57.9" Flow_SrcIp="1.1.1.47" Url_Category_Name="Software
> Updates" Flow_Bytes="37035" Web_Reputation_Threat_Type="" Avc_Tag_Name=""
> Ev_SrcLabel="CX-CX" Response_Magic_Type="application/x-ms-cab"
> Event_Type_Name="HTTP Complete" User_Realm="1.1.1.47" Policy_Name="Implicit
> Allow" Flow_Transaction_Id="3" Url="
> http://download.windowsupdate.com/d/msdownload/update/software/updt/2013/12/windows6.1-kb2891804-x64-express_9d70ffa853afa5f559c42d552c7626a47cb3e3da.cab"
>
> Identity_Source_Name="None" Auth_Policy_Name="Default" Flow_SrcIfc="inside"
> Flow_ConnId="27397591" Flow_DstHostName="download.windowsupdate.com"
> Flow_Transaction_Count="1" Ev_Id="43239" Web_Reputation_Score="9.2"
> Event_Type_Action="Info" Ev_GenTime="1421968494449" Flow_DstPort="80"
> Flow_DstIfc="outside" Ev_SrcId="2147484710" Avc_App_Na
>
>
> 1 2015-01-26T16:51:13.515Z 1.2.3.23 CiscoNGFW 2827 6 [ngfwEvent@9
> Flow_Dst_Service="tcp/80" Flow_Bytes_Sent="388" Event_Type="0"
> Flow_DstIp="199.27.79.129" Flow_SrcIp="1.1.1.32" Count="1"
> Url_Category_Name="Business and Industry" Flow_Bytes="388"
> Web_Reputation_Threat_Type="Adware" Avc_Tag_Name="" Ev_SrcLabel="CX-CX"
> Event_Type_Name="HTTP Deny" User_Realm="1.1.1.32" Policy_Name="Implicit
> Allow" Flow_Transaction_Id="0" Url="
> http://s.skimresources.com/js/23176X817180.skimlinks.js"
> Identity_Source_Name="None" Auth_Policy_Name="Default" Flow_SrcIfc="inside"
> Flow_ConnId="27947284" Flow_DstHostName="s.skimresources.com"
> Flow_Transaction_Count="1" Ev_Id="679530" Web_Reputation_Score="-9.1"
> Event_Type_Action="Deny" Ev_GenTime="1422291064092" Flow_DstPort="80"
> Policy_Deny_Reason_Name="Web Reputation" Flow_DstIfc="outside"
> Ev_SrcId="2147484710" Avc_App_Name="HyperText Transfer Protocol"
> Ev_SrcHwType="ASA-CX" Flow_SrcPort="44750" Smx_Config_Version="56"
> Flow_Requests_Denied="1" Avc_App_Type="Infrastructure
>
>
> Thanks! Let me know if anyone has any interest.
>
>
--
---
You received this message because you are subscribed to the Google Groups
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
For more options, visit https://groups.google.com/d/optout.