firewall.cisco.asa
Introduction
The tags beginning with firewall.cisco.asa identify events generated by Cisco Adaptive Security Appliance.
Valid tags and data tables
The full tag must have 3 levels. The first two are fixed as firewall.cisco. The third level identifies the type of events sent.
Technology | Brand | Type |
---|---|---|
firewall | cisco | asa |
These are the valid tags and corresponding data tables that will receive the parsers' data:
Tag | Data table |
---|---|
firewall.cisco.asa | firewall.cisco.asa |
Log samples
The following are sample logs sent to each of the firewall.cisco.asa data tables. Also, find how the information will be parsed in your data table under each sample log.
Extra columns
Fields marked as Extra in the table below are not shown by default in data tables and need to be explicitly requested in the query. You can find them marked as Extra when you perform a query so they can be easily identified. Learn more about this in Selecting unrevealed columns.
firewall.cisco.asa
2022-02-08 18:35:14.829 localhost=127.0.0.1 user.info firewall.cisco.asa: <167>Jan 09 2022 13:16:36 RockfordASA : %ASA-7-710002: UDP access permitted from 192.168.3.4/14856 to inside:192.168.3.254/snmp 2022-02-08 18:35:14.829 localhost=127.0.0.1 user.info firewall.cisco.asa: <163>Jan 09 2022 14:04:51 ARM-ASA5508-01 : %ASA-3-713902: Group = 192.168.3.4, IP = 192.168.3.4, Removing peer from correlator table failed, no match! 2022-02-08 18:35:14.911 localhost=127.0.0.1 user.info firewall.cisco.asa: <166>Jan 09 2022 15:11:53: %ASA-6-113039: Group <Policy-RemoteCorp> User <john.doe> IP <192.168.3.4> AnyConnect parent session started. 2022-02-08 18:35:14.912 localhost=127.0.0.1 user.info firewall.cisco.asa: <166>Jan 07 2022 13:54:35: %ASA-6-713905: Group = 192.168.3.4, IP = 192.168.3.4, Floating NAT-T from 192.168.3.4 port 500 to 192.168.3.4 port 4500 2022-02-08 18:35:14.912 localhost=127.0.0.1 user.info firewall.cisco.asa: <164>Jan 09 2022 14:02:23: %ASA-4-434002: SFR requested to drop TCP packet from inside:10.3.2.1/61726 to outside:10.3.2.2/443
And this is how the log would be parsed:
Field | Value | Type | Source field name | Field transformation | Extra fields |
---|---|---|---|---|---|
eventdate |
|
| |||
machine |
|
| |||
level |
|
| vlevel | ||
severity |
|
| priority | ||
eventId |
|
| |||
action |
|
| action1 |
| |
direction |
|
| |||
action_type |
|
| |||
protocol |
|
| protocol1 |
| |
ifaceIn |
|
| |||
srcIp |
|
| |||
srcPort |
|
| |||
srcMac |
|
| |||
ifaceOut |
|
| |||
dstIp |
|
| |||
dstPort |
|
| |||
type |
|
| |||
code |
|
| |||
aclId |
|
| |||
connId |
|
| |||
duration |
|
| |||
bytes |
|
| |||
bytesXmt |
|
| |||
bytesRcv |
|
| |||
reason |
|
| |||
srcXIp |
|
| |||
srcXPort |
|
| |||
dstXIp |
|
| |||
dstXPort |
|
| |||
hitCnt |
|
| |||
hitInterval |
|
| |||
hashCodes |
|
| |||
fwUserIn |
|
| |||
fwUserOut |
|
| |||
user |
|
| |||
userIP |
|
| |||
tcpFlags |
|
| |||
srcSeqId |
|
| |||
dstXSeqId |
|
| |||
dstSeqId |
|
| |||
icmpType |
|
| |||
icmpCode |
|
| |||
ipaddr |
|
| |||
connection |
|
| |||
dap_details |
|
| |||
ipOptions |
|
| |||
errorMessage |
|
| |||
usrName |
|
| |||
fromLevel |
|
| |||
toLevel |
|
| |||
service |
|
| |||
authAction |
|
| |||
sessionType |
|
| |||
group |
| ||||
groupPolicy |
|
| |||
message |
|
| |||
running |
|
| |||
executed |
|
| |||
server |
|
| |||
publicIp |
|
| |||
assignedIpv4 |
|
| |||
assignedIpv6 |
|
| |||
filename |
|
| |||
userAgent |
|
| |||
Object |
|
| |||
currentBurstRate |
|
| |||
currentBurstMaxRate |
|
| |||
currentAverageRate |
|
| |||
currentAverageMaxRate |
|
| |||
cumulativeTotal |
|
| |||
block_size |
|
| |||
free_blocks |
|
| |||
max_blocks |
|
| |||
attrName |
|
| |||
attrValue |
|
| |||
size |
|
| |||
offset |
| ||||
device |
|
| |||
state |
|
| |||
connectionsInUse |
|
| |||
connectionsMostUsed |
|
| |||
url |
|
| |||
numTries |
|
| |||
limitType |
|
| |||
limitBytes |
|
| |||
hdrLen |
|
| |||
pktLen |
|
| |||
sessionNumber |
|
| |||
peerType |
|
| |||
trustPoint |
|
| |||
rawBrand |
|
| "cisco" | ✓ | |
rawPhylum |
|
|
| ✓ | |
rawFamily |
| ✓ | |||
rawGenus |
| ✓ | |||
rawSpecies |
| ✓ | |||
rawHostName |
|
| ✓ | ||
rawHostIp |
|
| ✓ | ||
rawMessage |
|
| ✓ | ||
hostchain |
|
| ✓ | ||
tag |
|
|
| ✓ |