Looking at the syslog packets I see the Cisco ASA only uses local facility 
codes but my Palo Alto uses User facility codes:

08:55:50.340558 IP (tos 0x0, ttl 64, id 917, offset 0, flags [DF], proto 
UDP (17), length 329)
    10.10.10.151.44375 > 10.10.10.17.syslog: SYSLOG, length: 301
       * Facility user (1)*, Severity info (6)
        Msg: Oct 15 08:55:50 10.10.10.151 1,2019/10/15 
08:55:50,012001010622,SYSTEM,userid,0,2019/10/15 
08:55:50,,connect-ldap-sever,10.10.10.10,0,0,general,informational,"ldap 
cfg DOMAIN GMapping FW-Admins connected to server 10.10.10.10:389, 
initiated by: 10.10.10.152",1204131,0x0,0,0,0,0,,fw2
08:55:50.726480 IP (tos 0x0, ttl 254, id 65458, offset 0, flags [none], 
proto UDP (17), length 190)
    10.10.2.2.syslog > 10.10.10.17.syslog: SYSLOG, length: 162
        *Facility local4 (20)*, Severity warning (4)
        Msg: Oct 15 08:55:50 EDT fw1 : %ASA-4-106023: Deny udp src 
outside:10.10.201.105/137 dst outside:10.10.201.255/137 by access-group 
"outside_access_in" [0x0, 0x0]\0x0a

I can't change the ASA to be anything other than local facility.

On Tuesday, October 15, 2019 at 8:34:52 AM UTC-4, Nate wrote:
>
> Hi Dan,
>
> Yes I restarted the OSSEC service with a: service OSSEC restart
>
> Right now the iptables are wide open due to this issue:
>
> # iptables -L
> Chain INPUT (policy ACCEPT)
> target     prot opt source               destination
>
> Chain FORWARD (policy ACCEPT)
> target     prot opt source               destination
>
> Chain OUTPUT (policy ACCEPT)
> target     prot opt source               destination
> # iptables -S
> -P INPUT ACCEPT
> -P FORWARD ACCEPT
> -P OUTPUT ACCEPT
>
> My full remote connections list is the following:
>
>   <remote>
>    <connection>syslog</connection>
>    <allowed-ips>10.10.10.0/23</allowed-ips>
>    <allowed-ips>10.10.2.2</allowed-ips>
>    <allowed-ips>10.10.39.2</allowed-ips>
>    <allowed-ips>10.10.6.2</allowed-ips>
>    <allowed-ips>10.10.9.1</allowed-ips>
>    <allowed-ips>192.168.2.0/24</allowed-ips>
>    <port>514</port>
>   </remote>
>
> I will move up the 10.10.2.2 up above the /23 in case this is causing it 
> but I know we are getting syslog events from all other sources.
>
> Maybe it's the Cisco packet?
>
> On Tuesday, October 15, 2019 at 7:19:23 AM UTC-4, dan (ddpbsd) wrote:
>>
>> On Mon, Oct 14, 2019 at 3:03 PM Nate <[email protected]> wrote: 
>> > 
>> > Hi, 
>> > 
>> > I've never seen this before but I setup our ASA 5516 to send syslog 
>> events to our OSSEC server to detect SHUN events. 
>> > 
>> > ossec.conf 
>> >  <remote> 
>> >    <connection>syslog</connection> 
>> >    <allowed-ips>10.10.2.2</allowed-ips> 
>> >    <port>514</port> 
>> >   </remote> 
>> > 
>> >   <alerts> 
>> >     <log_alert_level>0</log_alert_level> 
>> >     <email_alert_level>9</email_alert_level> 
>> >   </alerts> 
>> > 
>> > 
>> > local_rules.xml 
>> > 
>> > <group name="ASA,LANAttack"> 
>> >    <rule id="100260" level="9"> 
>> >     <!-- <decoded_as>ASA-lanattk</decoded_as> --> 
>> >     <if_sid>4100</if_sid> 
>> >     <regex>ASA-4-73310\d|ASA-4-40100\d</regex> 
>> >     <description>ASA Shun event</description> 
>> >    </rule> 
>> > </group> 
>> > 
>> > 
>> > but reviewing the alerts, archives,database no events from our 
>> 10.10.2.2 or ASA show up. Running tcpdump on ossec shows they are received 
>> by the server: 
>> > 
>> > 14:53:41.611883 IP (tos 0x0, ttl 254, id 54586, offset 0, flags [none], 
>> proto UDP (17), length 140) 
>> >     10.10.2.2.syslog > 10.10.10.17.syslog: SYSLOG, length: 112 
>> >         Facility local0 (16), Severity warning (4) 
>> >         Msg: Oct 14 14:53:41 EDT fw1 : %ASA-4-401004: Shunned packet: 
>> 10.10.35.37 ==> 87.106.71.108 on interface inside\0x0a 
>> > 14:53:41.614335 IP (tos 0x0, ttl 254, id 46962, offset 0, flags [none], 
>> proto UDP (17), length 140) 
>> >     10.10.2.2.syslog > 10.10.10.17.syslog: SYSLOG, length: 112 
>> >         Facility local0 (16), Severity warning (4) 
>> >         Msg: Oct 14 14:53:41 EDT fw1 : %ASA-4-401004: Shunned packet: 
>> 10.10.35.37 ==> 87.106.71.108 on interface inside\0x0a 
>> > 
>> > If I copy out the Msg and paste it into ossec-logtest it does process 
>> it to my rule: 
>> > 
>> > [USER@ossec~]# /var/ossec/bin/ossec-logtest 
>> > 2019/10/14 14:58:37 ossec-testrule: INFO: Reading local decoder file. 
>> > 2019/10/14 14:58:37 ossec-testrule: INFO: Started (pid: 29400). 
>> > ossec-testrule: Type one log per line. 
>> > 
>> > Oct 14 14:53:41 EDT fw1 : %ASA-4-401004: Shunned packet: 10.10.35.37 
>> ==> 87.106.71.108 on interface inside\0x0a 
>> > 
>> > 
>> > **Phase 1: Completed pre-decoding. 
>> >        full event: 'Oct 14 14:53:41 EDT fw1 : %ASA-4-401004: Shunned 
>> packet: 10.10.35.37 ==> 87.106.71.108 on interface inside\0x0a' 
>> >        hostname: 'EDT' 
>> >        program_name: '(null)' 
>> >        log: 'fw1 : %ASA-4-401004: Shunned packet: 10.10.35.37 ==> 
>> 87.106.71.108 on interface inside\0x0a' 
>> > 
>> > **Phase 2: Completed decoding. 
>> >        decoder: 'ASA-lanattk' 
>> > 
>> > **Phase 3: Completed filtering (rules). 
>> >        Rule id: '100260' 
>> >        Level: '9' 
>> >        Description: 'ASA Shun event' 
>> > **Alert to be generated. 
>> > 
>> > I see that UDP port 514 is running: 
>> > 
>> > [root@secserv ~]# netstat -anp | grep 514 
>> > tcp        0      0 127.0.0.1:3306              127.0.0.1:37514       
>>       ESTABLISHED 5542/mysqld 
>> > tcp        0      0 127.0.0.1:37514             127.0.0.1:3306         
>>      ESTABLISHED 29340/ossec-dbd 
>> > udp        0      0 :::1514                     :::*                   
>>                  29373/ossec-remoted 
>> > udp        0      0 :::514                      :::*                   
>>                  29372/ossec-remoted 
>> > 
>> > 
>> > What obvious thing am I missing to setup an ASA to OSSEC? Our HP 
>> switches and Palo Alto firewall are sending syslogs just fine. 
>> > 
>>
>> After adding the system to allowed-ips, did you restart the OSSEC 
>> processes on the OSSEC server? 
>> Is there a host firewall (iptables) on the OSSEC server? Is 514UDP 
>> open to 10.10.2.2? 
>>
>> > -- 
>> > 
>> > --- 
>> > You received this message because you are subscribed to the Google 
>> Groups "ossec-list" group. 
>> > To unsubscribe from this group and stop receiving emails from it, send 
>> an email to [email protected]. 
>> > To view this discussion on the web visit 
>> https://groups.google.com/d/msgid/ossec-list/b1faa727-7071-49a0-91da-9fe4b680a724%40googlegroups.com.
>>  
>>
>>
>

-- 

--- 
You received this message because you are subscribed to the Google Groups 
"ossec-list" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To view this discussion on the web visit 
https://groups.google.com/d/msgid/ossec-list/e847005b-0106-4853-abef-512ff3a4a11f%40googlegroups.com.

Reply via email to