Skip to content

Commit 170f9c2

Browse files
authored
Cisco ASA: Fix message 106100 (elastic#20245)
This updates the parser for Cisco ASA message 106100 so that it doesn't fail when extra information is appended after the port numbers. Fixes elastic#19350
1 parent ba20017 commit 170f9c2

File tree

4 files changed

+90
-1
lines changed

4 files changed

+90
-1
lines changed

CHANGELOG.next.asciidoc

+1
Original file line numberDiff line numberDiff line change
@@ -224,6 +224,7 @@ https://github.com/elastic/beats/compare/v7.0.0-alpha2...master[Check the HEAD d
224224
- Fix Filebeat OOMs on very long lines {issue}19500[19500], {pull}19552[19552]
225225
- Fix s3 input parsing json file without expand_event_list_from_field. {issue}19902[19902] {pull}19962[19962]
226226
- Fix millisecond timestamp normalization issues in CrowdStrike module {issue}20035[20035], {pull}20138[20138]
227+
- Fix support for message code 106100 in Cisco ASA and FTD. {issue}19350[19350] {pull}20245[20245]
227228

228229
*Heartbeat*
229230

x-pack/filebeat/module/cisco/asa/test/asa-fix.log

+2
Original file line numberDiff line numberDiff line change
@@ -5,3 +5,5 @@ Apr 17 2020 14:16:20 SNL-ASA-VPN-A01 : %ASA-4-106023: Deny udp src Inside:10.123
55
Apr 17 2020 14:15:07 SNL-ASA-VPN-A01 : %ASA-2-106017: Deny IP due to Land Attack from 10.123.123.123 to 10.123.123.123
66
Apr 17 2020 14:15:07 SNL-ASA-VPN-A01 : %ASA-3-313008: Denied IPv6-ICMP type=134, code=0 from fe80::1ff:fe23:4567:890a on interface ISP1
77
Jun 08 2020 12:59:57: %ASA-4-313009: Denied invalid ICMP code 9, for Inside:10.255.0.206/8795 (10.255.0.206/8795) to identity:10.12.31.51/0 (10.12.31.51/0), ICMP id 295, ICMP type 8
8+
Oct 20 2019 15:42:53: %ASA-6-106100: access-list incoming permitted udp dmz2/127.2.3.4(56575) -> inside/127.3.4.5(53) hit-cnt 1 first hit [0x93d0e533, 0x578ef52f]
9+
Oct 20 2019 15:42:54: %ASA-6-106100: access-list incoming permitted udp dmz2/127.2.3.4(56575)(LOCAL\\username) -> inside/127.3.4.5(53) hit-cnt 1 first hit [0x93d0e533, 0x578ef52f]

x-pack/filebeat/module/cisco/asa/test/asa-fix.log-expected.json

+86
Original file line numberDiff line numberDiff line change
@@ -299,5 +299,91 @@
299299
"cisco-asa",
300300
"forwarded"
301301
]
302+
},
303+
{
304+
"cisco.asa.destination_interface": "inside",
305+
"cisco.asa.message_id": "106100",
306+
"cisco.asa.rule_name": "incoming",
307+
"cisco.asa.source_interface": "dmz2",
308+
"destination.address": "127.3.4.5",
309+
"destination.ip": "127.3.4.5",
310+
"destination.port": 53,
311+
"event.action": "firewall-rule",
312+
"event.category": [
313+
"network"
314+
],
315+
"event.code": 106100,
316+
"event.dataset": "cisco.asa",
317+
"event.kind": "event",
318+
"event.module": "cisco",
319+
"event.original": "%ASA-6-106100: access-list incoming permitted udp dmz2/127.2.3.4(56575) -> inside/127.3.4.5(53) hit-cnt 1 first hit [0x93d0e533, 0x578ef52f]",
320+
"event.outcome": "allow",
321+
"event.severity": 6,
322+
"event.timezone": "-02:00",
323+
"event.type": [
324+
"info",
325+
"allowed"
326+
],
327+
"fileset.name": "asa",
328+
"input.type": "log",
329+
"log.level": "informational",
330+
"log.offset": 1171,
331+
"network.iana_number": 17,
332+
"network.transport": "udp",
333+
"related.ip": [
334+
"127.2.3.4",
335+
"127.3.4.5"
336+
],
337+
"service.type": "cisco",
338+
"source.address": "127.2.3.4",
339+
"source.ip": "127.2.3.4",
340+
"source.port": 56575,
341+
"tags": [
342+
"cisco-asa",
343+
"forwarded"
344+
]
345+
},
346+
{
347+
"cisco.asa.destination_interface": "inside",
348+
"cisco.asa.message_id": "106100",
349+
"cisco.asa.rule_name": "incoming",
350+
"cisco.asa.source_interface": "dmz2",
351+
"destination.address": "127.3.4.5",
352+
"destination.ip": "127.3.4.5",
353+
"destination.port": 53,
354+
"event.action": "firewall-rule",
355+
"event.category": [
356+
"network"
357+
],
358+
"event.code": 106100,
359+
"event.dataset": "cisco.asa",
360+
"event.kind": "event",
361+
"event.module": "cisco",
362+
"event.original": "%ASA-6-106100: access-list incoming permitted udp dmz2/127.2.3.4(56575)(LOCAL\\\\username) -> inside/127.3.4.5(53) hit-cnt 1 first hit [0x93d0e533, 0x578ef52f]",
363+
"event.outcome": "allow",
364+
"event.severity": 6,
365+
"event.timezone": "-02:00",
366+
"event.type": [
367+
"info",
368+
"allowed"
369+
],
370+
"fileset.name": "asa",
371+
"input.type": "log",
372+
"log.level": "informational",
373+
"log.offset": 1334,
374+
"network.iana_number": 17,
375+
"network.transport": "udp",
376+
"related.ip": [
377+
"127.2.3.4",
378+
"127.3.4.5"
379+
],
380+
"service.type": "cisco",
381+
"source.address": "127.2.3.4",
382+
"source.ip": "127.2.3.4",
383+
"source.port": 56575,
384+
"tags": [
385+
"cisco-asa",
386+
"forwarded"
387+
]
302388
}
303389
]

x-pack/filebeat/module/cisco/shared/ingest/asa-ftd-pipeline.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -253,7 +253,7 @@ processors:
253253
- dissect:
254254
if: "ctx._temp_.cisco.message_id == '106100'"
255255
field: "message"
256-
pattern: "access-list %{_temp_.cisco.list_id} %{event.outcome} %{network.transport} %{_temp_.cisco.source_interface}/%{source.address}(%{source.port}) -> %{_temp_.cisco.destination_interface}/%{destination.address}(%{destination.port}) %{}"
256+
pattern: "access-list %{_temp_.cisco.list_id} %{event.outcome} %{network.transport} %{_temp_.cisco.source_interface}/%{source.address}(%{source.port})%{}-> %{_temp_.cisco.destination_interface}/%{destination.address}(%{destination.port})%{}"
257257
- dissect:
258258
if: "ctx._temp_.cisco.message_id == '106102'"
259259
field: "message"

0 commit comments

Comments
 (0)