Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 5 additions & 0 deletions packages/cisco_ftd/changelog.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,9 @@
# newer versions go on top
- version: "3.10.3"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Shouldn't this be 3.11.0 since we are adding support for new types in this?

changes:
- description: Add support for Security Group Tag (SGT) and Endpoint Group (EPG) fields in connection events.
type: enhancement
link: https://github.com/elastic/integrations/pull/15652
- version: "3.10.2"
changes:
- description: Fix parsing for message ID 313005 to accept input type unknown.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -7,4 +7,4 @@ fields:
external_zones:
- output-zone
internal_zones:
- input-zone
- input-zone
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
2025-09-01T12:00:00Z firepower : %FTD-6-430003: EventPriority: Low, DeviceUUID: d697c8ca-9fe4-43e6-aeb5-33e277e5ffea, InstanceID: 11, FirstPacketSecond: 2025-09-01T12:35:00Z, ConnectionID: 39416, AccessControlRuleAction: Trust, SrcIP: 10.0.100.30, DstIP: 10.0.1.20, SrcPort: 56799, DstPort: 53, Protocol: udp, IngressInterface: inside, EgressInterface: outside, SourceSecurityGroup: SGT_TEST_GROUP, SourceSecurityGroupTag: 2003, SourceSecurityGroupType: Session Directory, DestinationIP_DynamicAttribute: APIC_EPG_TEST_GROUP, IngressVRF: Global, EgressVRF: Global, Endpoint Profile: Workstation:Microsoft-Workstation:Windows11-Workstation, ACPolicy: ACP-Access, AccessControlRuleName: Test-Rule-1, Prefilter Policy: Default Prefilter Policy, User: testuser, Client: DNS, ApplicationProtocol: DNS, ConnectionDuration: 0, InitiatorPackets: 1, ResponderPackets: 1, InitiatorBytes: 31, ResponderBytes: 238, NAPPolicy: Balanced Security and Connectivity
2025-09-01T14:00:00Z firepower : %FTD-6-430002: EventPriority: Low, DeviceUUID: d697c8ca-9fe4-43e6-aeb5-33e277e5ffea, InstanceID: 4, FirstPacketSecond: 2025-09-01T14:00:03Z, ConnectionID: 36584, AccessControlRuleAction: Block, SrcIP: 10.0.100.30, DstIP: 10.0.1.20, SrcPort: 56799, DstPort: 22, Protocol: tcp, IngressInterface: inside, EgressInterface: outside, SourceSecurityGroup: 2005, SourceSecurityGroupTag: 2005, DestinationSecurityGroup: 9, DestinationSecurityGroupTag: 9, SourceSecurityGroupType: Session Directory, DestinationSecurityGroupType: SXP, IngressVRF: Global, EgressVRF: Global, Endpoint Profile: Invalid ID, ACPolicy: ACP-Management, AccessControlRuleName: Default Deny, Prefilter Policy: Management Prefilter Policy, InitiatorPackets: 1, ResponderPackets: 0, InitiatorBytes: 70, ResponderBytes: 0, NAPPolicy: Balanced Security and Connectivity

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think you can remove this empty log line

Original file line number Diff line number Diff line change
@@ -0,0 +1,283 @@
{
"expected": [
{
"@timestamp": "2025-09-01T12:35:00.000Z",
"cisco": {
"ftd": {
"destination_interface": "outside",
"rule_name": [
"ACP-Access",
"Test-Rule-1"
],
"security": {
"endpoint_profile": "Workstation:Microsoft-Workstation:Windows11-Workstation"
},
"security_event": {
"ac_policy": "ACP-Access",
"access_control_rule_action": "Trust",
"access_control_rule_name": "Test-Rule-1",
"application_protocol": "DNS",
"client": "DNS",
"connection_duration": 0,
"destination_ip_dynamic_attribute": "APIC_EPG_TEST_GROUP",
"dst_ip": "10.0.1.20",
"dst_port": 53,
"egress_interface": "outside",
"first_packet_second": "2025-09-01T12:35:00Z",
"ingress_interface": "inside",
"initiator_bytes": 31,
"initiator_packets": 1,
"nap_policy": "Balanced Security and Connectivity",
"prefilter_policy": "Default Prefilter Policy",
"protocol": "udp",
"responder_bytes": 238,
"responder_packets": 1,
"source_security_group": "SGT_TEST_GROUP",
"source_security_group_tag": "2003",
"source_security_group_type": "Session Directory",
"src_ip": "10.0.100.30",
"src_port": 56799,
"user": "testuser"
},
"source_interface": "inside"
}
},
"destination": {
"address": "10.0.1.20",
"bytes": 238,
"ip": "10.0.1.20",
"packets": 1,
"port": 53
},
"device": {
"manufacturer": "Microsoft",
"model": {
"name": "Windows11"
}
},
"ecs": {
"version": "8.17.0"
},
"event": {
"action": "connection-finished",
"category": [
"network"
],
"code": "430003",
"duration": 0,
"end": "2025-09-01T12:35:00.000Z",
"kind": "event",
"original": "2025-09-01T12:00:00Z firepower : %FTD-6-430003: EventPriority: Low, DeviceUUID: d697c8ca-9fe4-43e6-aeb5-33e277e5ffea, InstanceID: 11, FirstPacketSecond: 2025-09-01T12:35:00Z, ConnectionID: 39416, AccessControlRuleAction: Trust, SrcIP: 10.0.100.30, DstIP: 10.0.1.20, SrcPort: 56799, DstPort: 53, Protocol: udp, IngressInterface: inside, EgressInterface: outside, SourceSecurityGroup: SGT_TEST_GROUP, SourceSecurityGroupTag: 2003, SourceSecurityGroupType: Session Directory, DestinationIP_DynamicAttribute: APIC_EPG_TEST_GROUP, IngressVRF: Global, EgressVRF: Global, Endpoint Profile: Workstation:Microsoft-Workstation:Windows11-Workstation, ACPolicy: ACP-Access, AccessControlRuleName: Test-Rule-1, Prefilter Policy: Default Prefilter Policy, User: testuser, Client: DNS, ApplicationProtocol: DNS, ConnectionDuration: 0, InitiatorPackets: 1, ResponderPackets: 1, InitiatorBytes: 31, ResponderBytes: 238, NAPPolicy: Balanced Security and Connectivity",
"outcome": "success",
"severity": 6,
"start": "2025-09-01T12:35:00.000Z",
"timezone": "UTC",
"type": [
"connection",
"end",
"allowed"
]
},
"host": {
"hostname": "firepower",
"type": "Microsoft"
},
"log": {
"level": "informational"
},
"network": {
"application": "dns",
"bytes": 269,
"community_id": "1:xlmEboTK1cVSycaPD+f1Ii6nxMg=",
"iana_number": "17",
"protocol": "dns",
"transport": "udp"
},
"observer": {
"egress": {
"interface": {
"name": "outside"
}
},
"hostname": "firepower",
"ingress": {
"interface": {
"name": "inside"
}
},
"product": "ftd",
"type": "idps",
"vendor": "Cisco"
},
"related": {
"hosts": [
"firepower"
],
"ip": [
"10.0.100.30",
"10.0.1.20"
],
"user": [
"testuser"
]
},
"rule": {
"name": "Test-Rule-1",
"ruleset": "ACP-Access"
},
"source": {
"address": "10.0.100.30",
"bytes": 31,
"ip": "10.0.100.30",
"packets": 1,
"port": 56799
},
"tags": [
"preserve_original_event"
],
"user": {
"id": "testuser",
"name": "testuser"
}
},
{
"@timestamp": "2025-09-01T14:00:03.000Z",
"cisco": {
"ftd": {
"destination_interface": "outside",
"rule_name": [
"ACP-Management",
"Default Deny"
],
"security": {
"endpoint_profile": "Invalid ID"
},
"security_event": {
"ac_policy": "ACP-Management",
"access_control_rule_action": "Block",
"access_control_rule_name": "Default Deny",
"destination_security_group": "9",
"destination_security_group_tag": "9",
"dst_ip": "10.0.1.20",
"dst_port": 22,
"egress_interface": "outside",
"first_packet_second": "2025-09-01T14:00:03Z",
"ingress_interface": "inside",
"initiator_bytes": 70,
"initiator_packets": 1,
"nap_policy": "Balanced Security and Connectivity",
"prefilter_policy": "Management Prefilter Policy",
"protocol": "tcp",
"responder_bytes": 0,
"responder_packets": 0,
"source_security_group": "2005",
"source_security_group_tag": "2005",
"source_security_group_type": "Session Directory",
"src_ip": "10.0.100.30",
"src_port": 56799
},
"source_interface": "inside"
}
},
"destination": {
"address": "10.0.1.20",
"bytes": 0,
"ip": "10.0.1.20",
"packets": 0,
"port": 22
},
"ecs": {
"version": "8.17.0"
},
"event": {
"action": "connection-started",
"category": [
"network"
],
"code": "430002",
"kind": "event",
"original": "2025-09-01T14:00:00Z firepower : %FTD-6-430002: EventPriority: Low, DeviceUUID: d697c8ca-9fe4-43e6-aeb5-33e277e5ffea, InstanceID: 4, FirstPacketSecond: 2025-09-01T14:00:03Z, ConnectionID: 36584, AccessControlRuleAction: Block, SrcIP: 10.0.100.30, DstIP: 10.0.1.20, SrcPort: 56799, DstPort: 22, Protocol: tcp, IngressInterface: inside, EgressInterface: outside, SourceSecurityGroup: 2005, SourceSecurityGroupTag: 2005, DestinationSecurityGroup: 9, DestinationSecurityGroupTag: 9, SourceSecurityGroupType: Session Directory, DestinationSecurityGroupType: SXP, IngressVRF: Global, EgressVRF: Global, Endpoint Profile: Invalid ID, ACPolicy: ACP-Management, AccessControlRuleName: Default Deny, Prefilter Policy: Management Prefilter Policy, InitiatorPackets: 1, ResponderPackets: 0, InitiatorBytes: 70, ResponderBytes: 0, NAPPolicy: Balanced Security and Connectivity",
"outcome": "success",
"severity": 6,
"start": "2025-09-01T14:00:03Z",
"timezone": "UTC",
"type": [
"connection",
"start",
"denied"
]
},
"host": {
"hostname": "firepower"
},
"log": {
"level": "informational"
},
"network": {
"bytes": 70,
"community_id": "1:jcSnhrPf/GVREflEdymeibE8U/A=",
"iana_number": "6",
"transport": "tcp"
},
"observer": {
"egress": {
"interface": {
"name": "outside"
}
},
"hostname": "firepower",
"ingress": {
"interface": {
"name": "inside"
}
},
"product": "ftd",
"type": "idps",
"vendor": "Cisco"
},
"related": {
"hosts": [
"firepower"
],
"ip": [
"10.0.100.30",
"10.0.1.20"
]
},
"rule": {
"name": "Default Deny",
"ruleset": "ACP-Management"
},
"source": {
"address": "10.0.100.30",
"bytes": 70,
"ip": "10.0.100.30",
"packets": 1,
"port": 56799
},
"tags": [
"preserve_original_event"
]
},
{
"ecs": {
"version": "8.17.0"
},
"event": {
"severity": 7,
"timezone": "UTC"
},
"log": {
"level": "debug"
},
"observer": {
"product": "ftd",
"type": "idps",
"vendor": "Cisco"
},
"tags": [
"preserve_original_event"
]
}
]
}
Original file line number Diff line number Diff line change
Expand Up @@ -1260,6 +1260,15 @@ processors:
DstPort:
target: dst_port
ecs: [destination.port]
DestinationIP_DynamicAttribute:
target: destination_ip_dynamic_attribute
id: ["430002", "430003"]
DestinationSecurityGroup:
target: destination_security_group
id: ["430002", "430003"]
DestinationSecurityGroupTag:
target: destination_security_group_tag
id: ["430002", "430003"]
EgressInterface:
target: egress_interface
id: ["430001", "430002", "430003"]
Expand Down Expand Up @@ -1475,6 +1484,15 @@ processors:
SperoDisposition:
target: spero_disposition
id: ["430004", "430005"]
SourceSecurityGroup:
target: source_security_group
id: ["430002", "430003"]
SourceSecurityGroupTag:
target: source_security_group_tag
id: ["430002", "430003"]
SourceSecurityGroupType:
target: source_security_group_type
id: ["430002", "430003"]
SrcIP:
target: src_ip
ecs: [source.address]
Expand Down Expand Up @@ -1565,6 +1583,9 @@ processors:
'dns_record_type',
'dns_response_type',
'dns_ttl',
'destination_ip_dynamic_attribute',
'destination_security_group',
'destination_security_group_tag',
'dst_ip',
'dst_port',
'egress_interface',
Expand Down Expand Up @@ -1595,6 +1616,9 @@ processors:
'responder_bytes',
'responder_packets',
'sha_disposition',
'source_security_group',
'source_security_group_tag',
'source_security_group_type',
'spero_disposition',
'src_ip',
'src_port',
Expand Down
18 changes: 18 additions & 0 deletions packages/cisco_ftd/data_stream/log/fields/fields.yml
Original file line number Diff line number Diff line change
Expand Up @@ -201,6 +201,15 @@
type: ip
- name: dst_port
type: integer
- name: destination_ip_dynamic_attribute
type: keyword
description: Destination IP dynamic attribute (EPG information)
- name: destination_security_group
type: keyword
description: Destination Security Group Tag (SGT)
- name: destination_security_group_tag
type: keyword
description: Destination Security Group Tag number
- name: egress_interface
type: keyword
- name: egress_zone
Expand Down Expand Up @@ -259,6 +268,15 @@
type: keyword
- name: spero_disposition
type: keyword
- name: source_security_group
type: keyword
description: Source Security Group Tag (SGT)
- name: source_security_group_tag
type: keyword
description: Source Security Group Tag number
- name: source_security_group_type
type: keyword
description: Source Security Group Tag type
- name: src_ip
type: ip
- name: src_port
Expand Down
Loading