Document toolboxDocument toolbox

firewall.all.traffic

Introduction

This union table collects information from a set of tables containing firewall traffic events from a variety of firewall manufacturers.

Source tables

The information displayed is extracted from the following tables: 

  • adn.f5.bigip.afm

  • adn.f5.bigip.asm

  • box.iptables

  • cef0.checkPoint.vpn1Firewall1

  • cef0.cisco.asa

  • cef0.cisco.firepower

  • cef0.forcepoint.firewall

  • cef0.fortinet.fortigateAll

  • cef0.paloAltoNetworks.lf

  • cef0.paloAltoNetworks.panOs

  • cef0.stonesoft.firewall

  • cef0.stonesoft.stonegate

  • cef0.zscaler.nssfwlog

  • cloud.azure.firewall.application_rule

  • cloud.azure.firewall.network_rule

  • cloud.cloudflare.logpush.http

  • edr.crowdstrike.falconstreaming.firewall_match

  • firewall.checkpoint.fw

  • firewall.checkpoint.gaia

  • firewall.checkpoint.lea

  • firewall.checkpoint.log_exporter

  • firewall.cisco.asa

  • firewall.cisco.fmc

  • firewall.cisco.fmc_estreamer

  • firewall.cisco.ftd

  • firewall.cisco.fwsm

  • firewall.cisco.pix

  • firewall.fortinet.traffic

  • firewall.juniper.isg.traffic

  • firewall.juniper.nsm.traffic

  • firewall.juniper.srx.traffic

  • firewall.juniper.ssg.traffic

  • firewall.meraki.flows

  • firewall.paloalto.traffic

  • firewall.pfsense.filterlog

  • firewall.pfsense.firewall

  • firewall.sangfor.app_control.event

  • firewall.sonicwall.genv58

  • firewall.sophos.securenet.packetfilter

  • firewall.sophos.xgfirewall.firewall

  • firewall.stonegate.leef

  • firewall.stonegate.xml

  • firewall.velocloud.traffic

  • firewall.vyatta.traffic

  • firewall.watchguard.traffic

  • network.meraki.firewall

  • network.meraki.l7_firewall

  • proxy.zscaler.nss_firewall

  • proxy.zscaler.zia.firewall

Table structure

This is the set of columns displayed by this union table, which is the result of the collection of columns present in all source tables:

Extra columns

Fields marked as Extra in the table below are not shown by default in data tables and need to be explicitly requested in the query. You can find them marked as Extra when you perform a query so they can be easily identified. Learn more about this in Selecting unrevealed columns.

Field

Type

Field transformation

Source field name

Extra fields

Field

Type

Field transformation

Source field name

Extra fields

eventdate

timestamp

 

 

 

source

str

 

 

 

hostname

str

 

 

 

firewall_name

str

 

fwname

 

firewall_cluster

str

 

fwcluster

 

action

str

 

 

 

reason

str

 

 

 

source_ipv4

ip4

 

srcIp

 

source_ip

str

 

srcIp_str

 

destination_ipv4

ip4

 

dstIp

 

destination_ip

str

 

dstIp_str

 

source_port

str

str(srcPort)

srcPort

 

destination_port

str

str(dstPort)

dstPort

 

source_zone

str

 

srcZone

 

destination_zone

str

 

dstZone

 

application

str

 

app

 

protocol

str

 

proto

 

rule

str

 

 

 

source_interface

str

 

srcIface

 

destination_interface

str

 

dstIface

 

source_service

str

 

srcService

 

destination_service

str

 

dstService

 

packets_total

int8

 

packetsTotal

 

packets_sent

int8

 

packetsSent

 

packets_received

int8

 

packetsRecv

 

bytes_total

int8

 

bytes

 

bytes_sent

int8

 

bytesSent

 

bytes_received

int8

 

bytesRecv

 

source_username

str

 

srcUser

 

x_forwarded_for_ip

str

 

 

 

firewall_ip

str

 

 

 

rawMessage

str

 

rawSource

 

hostchain

str

 

 

tag

str

 

 

Field transformations

Even though all source tables have several features in common, they have some particularities that make it necessary to undergo a set of transformations to harmonize them for the union table. The most common transformations comprise changes in the data type or the application of rules when several columns in the source table feed a single column in the union table. You can find below the detailed list of transformations in each source table.