- AccessControlRuleAction
-
The action associated with the configuration that logged the connection.
For Security Intelligence-monitored connections, the action is that of the first non-Monitor access control rule triggered
by the connection, or the default action. Similarly, because traffic matching a Monitor rule is always handled by a subsequent
rule or by the default action, the action associated with a connection logged due to a Monitor rule is never Monitor. However,
you can still trigger correlation policy violations on connections that match Monitor rules.
Action
|
Description
|
Allow
|
Connections either allowed by access control explicitly, or allowed because a user bypassed an interactive block.
|
Block, Block with reset
|
Blocked connections, including:
-
tunnels and other connections blocked by the prefilter policy
-
connections blocked by Security Intelligence
-
encrypted connections blocked by an SSL policy
-
connections where an exploit was blocked by an intrusion policy
-
connections where a file (including malware) was blocked by a file policy
For connections where the system blocks an intrusion or file, system displays Block, even though you use access control Allow rules to invoke deep inspection.
|
Fastpath
|
Non-encrypted tunnels and other connections fastpathed by the prefilter policy.
|
Interactive Block, Interactive Block with reset
|
Connections logged when the system initially blocks a user’s HTTP request using an Interactive Block rule. If the user clicks
through the warning page that the system displays, additional connections logged for the session have an action of Allow.
|
Trust
|
Connections trusted by access control. The system logs trusted TCP connections differently depending on the device model.
|
Default Action
|
Connections handled by the access control policy's default action.
|
(Blank/empty)
|
The connection closed before enough packets had passed to match a rule.
This can happen only if a facility other than access control, such as intrusion prevention, causes the connection to be logged.
|
- AccessControlRuleName
-
The access control rule or default action that handled the connection, as well as up to eight Monitor rules matched by that
connection.
If the connection matched one Monitor rule, the Secure Firewall Management
Center displays the name of the rule that handled the connection, followed by the Monitor rule name. If the connection matched more
than one Monitor rule, the number of matching Monitor rules is displayed, for example, Default Action + 2 Monitor Rules.
- AccessControlRuleReason
-
The reason or reasons the connection was logged, if available.
Connections with a Reason of IP Block, DNS Block, and URL Block have a threshold of 15 seconds per unique initiator-responder
pair. After the system blocks one of those connections, it does not generate connection events for additional blocked connections
between those two hosts for the next 15 seconds, regardless of port or protocol.
- ACPolicy
-
The access control policy that monitored the connection.
- ApplicationProtocol
-
The application protocol, which represents communications between hosts, detected in the connection.
- Client
-
The client application detected in the connection.
If the system cannot identify the specific client used in the connection, the field displays the word "client" appended to
the application protocol name to provide a generic name, for example, FTP client.
- ClientVersion
-
The version of the client application detected in the connection, if available.
- Connection Counter
-
This field was added in release 6.5.
A counter that distinguishes one connection from another simultaneous connection. This field has no significance on its own.
The
following fields collectively uniquely identify a
connection event: DeviceUUID, First Packet Time,
Connection Instance ID, and Connection
Counter.
- Connection Instance ID
-
This field was added in release 6.5.
The Snort instance that processed the connection event. This field has no significance on its own.
The
following fields collectively uniquely identify a
connection event: DeviceUUID, First Packet Time,
Connection Instance ID, and Connection
Counter.
- ConnectionDuration
-
This field was introduced in version 6.3.
This field has a value only when logging occurs at the end of the connection. For a start-of-connection syslog message, this
field is not output, as it is not known at that time.
For an end-of-connection syslog message, this field indicates the number of seconds between the first packet and the last
packet, which may be zero for a short connection. For example, if the timestamp of the syslog is 12:34:56 and the ConnectionDuration
is 5, then the first packet was seen at 12:34:51.
- DetectionType
-
This field was introduced in release 7.1.
This field shows the source of detection of a client application. It can be AppID or Encrypted Visibility.
- DestinationSecurityGroup
-
This field was introduced in release 6.5.
The Security Group of the destination involved in the connection.
This field holds the text value associated with the numeric value in DestinationSecurityGroupTag, if available. If the group name is not available as a text value, then this field contains the same integer value as the
DestinationSecurityGroupTag field.
- DestinationSecurityGroupTag
-
This field was introduced in release 6.5.
The numeric Security Group Tag (SGT) attribute of the destination involved in the connection.
In release 6.6, this value is obtained from the source specified in the DestinationSecurityGroupType field.
In release 6.5, this value is obtained from ISE, either from SXP or from a user session.
See also SourceSecurityGroupTag.
- DestinationSecurityGroupType
-
This field was introduced in release 6.6.
This field displays the source from which a security group tag was obtained.
Value
|
Description
|
Inline
|
Destination SGT value is from packet
|
Session Directory
|
Destination SGT value is from ISE via session directory topic
|
SXP
|
Destination SGT value is from ISE via SXP topic
|
- DeviceUUID
-
This field was added in release 6.5.
The unique identifier of the device that generated an event.
The
following fields collectively uniquely identify a
connection event: DeviceUUID, First Packet Time,
Connection Instance ID, and Connection
Counter.
- DNS_Sinkhole
-
The name of the sinkhole server where the system redirected a connection.
- DNS_TTL
-
The number of seconds a DNS server caches the DNS resource record.
- DNSQuery
-
The DNS query submitted in a connection to the name server to look up a domain name.
Starting in release 6.7 as an experimental feature:
This field can also hold the domain name for URL filtering matches when DNS filtering is enabled. In this case, the URL field
will be blank and the URL Category and URL Reputation fields contain the values associated with the domain.
- DNSRecordType
-
The type of the DNS resource record used to resolve a DNS query submitted in a connection.
- DNSResponseType
-
The DNS response returned in a connection to the name server when queried.
- DNSSICategory
- See URLSICategory.
- DstIP
-
The IP address (and host name, if DNS resolution is enabled) of the session responder (destination IPaddress).
For plaintext, passthrough tunnels either blocked or fastpathed by the prefilter policy, initiator and responder IP addresses
represent the tunnel endpoints—the routed interfaces of the network devices on either side of the tunnel.
- DstPort
-
The port used by the session responder.
- EgressInterface
-
The egress interface associated with the connection. If your deployment includes an asymmetric routing configuration, the
ingress and egress interface may not belong to the same inline pair.
- EgressVRF
-
Support for this field was added in version 6.6.
In networks using virtual routing and forwarding, the name of the virtual router through which traffic exited the network.
- EgressZone
-
The egress security zone associated with the connection.
For rezoned encapsulated connections, the egress field is blank.
- Endpoint Profile
-
The user's endpoint device type, as identified by ISE.
- EncryptedVisibilityFingerprint
-
Support for this field was added in version 7.4.
The TLS fingerprint detected by the Encrypted Visibility Engine (EVE) for the session.
- EncryptedVisibilityProcessName
-
Support for this field was added in version 7.1.
Process or client in the TLS client hello packet that was analyzed by the Encrypted Visibility Engine (EVE).
- EncryptedVisibilityConfidenceScore
-
Support for this field was added in version 7.1.
The confidence value in the range 0-100% that the encrypted visibility engine has detected the right process. For example,
if the process name is Firefox and if the confidence score is 80%, it means that the engine is 80% confident that the process
it has detected is Firefox.
- EncryptedVisibilityThreatConfidence
-
Support for this field was added in version 7.1.
The probability level that the process detected by the encrypted visibility engine contains threat. This field indicates the
bands (Very High, High, Medium, Low, or Very Low) based on the value in the threat confidence score.
- EncryptedVisibilityThreatConfidenceScore
-
The confidence value in the range 0-100% that the process detected by the encrypted visibility engine contains threat. If
the threat confidence score is very high, say 90%, then the Encrypted Visibility Process Name field displays "Malware."
- Event Priority
-
This field was added in release 6.5.
Whether or not the connection event is a high priority event. High
priority events are connection events that are associated with an intrusion, Security Intelligence, file, or malware event.
All other events are Low
priority.
- FileCount
-
The number of files (including malware files) detected or blocked in a connection associated with one or more file events.
- First Packet Time
-
This field was added in release 6.5.
The time the system encountered the first packet.
The
following fields collectively uniquely identify a
connection event: DeviceUUID, First Packet Time,
Connection Instance ID, and Connection
Counter.
- HTTPReferer
-
The HTTP referrer, which represents the referrer of a requested URL for HTTP traffic detected in the connection (such as a
website that provided a link to, or imported a link from, another URL).
- HTTPResponse
-
The HTTP status code sent in response to a client's HTTP request over a connection. It indicates the reason behind successful
and failed HTTP request.
For more details about HTTP response codes, see RFC 2616 (HTTP), Section 10.
- ICMPCode
-
The ICMP code used by the session responder.
- ICMPType
-
The ICMP type used by the session initiator.
- IngressInterface
-
The ingress interface associated with the connection. If your deployment includes an asymmetric routing configuration, the
ingress and egress interface may not belong to the same inline pair.
- IngressVRF
-
Support for this field was added in version 6.6.
In networks using virtual routing and forwarding, the name of the virtual router through which traffic entered the network.
- IngressZone
-
The ingress security zone associated with the connection.
For rezoned encapsulated connections, the ingress field displays the tunnel zone you assigned, instead of the original ingress
security zone.
- InitiatorBytes
-
The total number of bytes transmitted by the session initiator.
- InitiatorPackets
-
The total number of packets transmitted by the session initiator.
- IPReputationSICategory
- See URLSICategory.
- IPSCount
-
The number of intrusion events, if any, associated with the connection.
- NAPPolicy
-
The network analysis policy (NAP), if any, associated with the generation of the event.
- NAT_InitiatorIP, NAT_ResponderIP
-
Support for this field was added in version 7.1.
-
The NAT translated IP address of the session initiator or responder.
- NAT_InitiatorPort, NAT_ResponderPort
-
Support for this field was added in version 7.1.
-
The NAT translated port of the session initiator or responder.
- NetBIOSDomain
-
The NetBIOS domain used in the session.
- originalClientSrcIP
-
The original client IP address from an X-Forwarded-For (XFF), True-Client-IP, or custom-defined HTTP header. To populate this
field, you must enable an access control rule that handles proxied traffic based on its original client.
- Prefilter Policy
-
The prefilter policy that handled the connection.
- Protocol
-
The transport protocol used in the connection. To search for a specific protocol, use the name or number protocol as listed
in http://www.iana.org/assignments/protocol-numbers.
- ReferencedHost
-
If the protocol in the connection is HTTP or HTTPS, this field displays the host name that the respective protocol was using.
- ResponderBytes
-
The total number of bytes transmitted by the session responder.
- ResponderPackets
-
The total number of packets received by the session responder.
- SecIntMatchingIP
-
Which IP address matched.
Possible values: None, Destination, or Source.
- Security Group
-
In release 6.5, this field was replaced by the SourceSecurityGroupTag field, and new fields for SourceSecurityGroup, DestinationSecurityGroupTag, and DestinationSecurityGroup were introduced.
The Security Group Tag (SGT) attribute of the packet involved in the connection. The SGT specifies the privileges of a traffic
source within a trusted network. Security Group Access (a feature of both Cisco TrustSec and Cisco ISE) applies the attribute
as packets enter the network.
- SourceSecurityGroup
-
This field was introduced in release 6.5.
The Security Group of the source involved in the connection.
This field holds the text value associated with the numeric value in SourceSecurityGroupTag, if available. If the group name is not available as a text value, then this field contains the same integer value as the
SourceSecurityGroupTag field. Tags can be obtained from inline devices (no source SGT name specified) or from ISE (which specifies
a source).
- SourceSecurityGroupTag
-
In release 6.5, this field replaced the Security Group field.
The numeric representation of the Security Group Tag (SGT) attribute of the packet involved in the connection. The SGT specifies
the privileges of a traffic source within a trusted network. Security Group Access (a feature of both Cisco TrustSec and Cisco
ISE) applies the attribute as packets enter the network.
See also DestinationSecurityGroupTag.
- SourceSecurityGroupType
-
This field was introduced in release 6.6.
This field displays the source from which a security group tag was obtained.
Value
|
Description
|
Inline
|
Source SGT value is from packet
|
Session Directory
|
Source SGT value is from ISE via session directory topic
|
SXP
|
Source SGT value is from ISE via SXP topic
|
- SrcIP
-
The IP address (and host name, if DNS resolution is enabled) of the session initiator (source IP address).
For plaintext, passthrough tunnels either blocked or fastpathed by the prefilter policy, initiator and responder IP addresses
represent the tunnel endpoints—the routed interfaces of the network devices on either side of the tunnel.
- SrcPort
-
The port used by the session initiator.
- SSLActualAction
-
The action the system applied to encrypted traffic in the SSL policy.
Action
|
Description
|
Block/Block with reset
|
Represents blocked encrypted connections.
|
Decrypt (Resign)
|
Represents an outgoing connection decrypted using a re-signed server certificate.
|
Decrypt (Replace Key)
|
Represents an outgoing connection decrypted using a self-signed server certificate with a substituted public key.
|
Decrypt (Known Key)
|
Represents an incoming connection decrypted using a known private key.
|
Default Action
|
Indicates the connection was handled by the default action.
|
Do not Decrypt
|
Represents a connection the system did not decrypt.
|
- SSLCertificate
-
The information stored on the public key certificate used to encrypt traffic, including:
-
Subject/Issuer Common Name
-
Subject/Issuer Organization
-
Subject/Issuer Organization Unit
-
Not Valid Before/After
-
Serial Number
-
Certificate Fingerprint
-
Public Key Fingerprint
- SSLExpectedAction
-
The action the system expected to apply to encrypted traffic, given the SSL rules in effect.
- SSLFlowStatus
-
The reason the system failed to decrypt encrypted traffic:
-
Unknown
-
No Match
-
Success
-
Uncached Session
-
Unknown Cipher Suite
-
Unsupported Cipher Suite
-
Unsupported SSL Version
-
SSL Compression Used
-
Session Undecryptable in Passive Mode
-
Handshake Error
-
Decryption Error
-
Pending Server Name Category Lookup
-
Pending Common Name Category Lookup
-
Internal Error
-
Network Parameters Unavailable
-
Invalid Server Certificate Handle
-
Server Certificate Fingerprint Unavailable
-
Cannot Cache Subject DN
-
Cannot Cache Issuer DN
-
Unknown SSL Version
-
External Certificate List Unavailable
-
External Certificate Fingerprint Unavailable
-
Internal Certificate List Invalid
-
Internal Certificate List Unavailable
-
Internal Certificate Unavailable
-
Internal Certificate Fingerprint Unavailable
-
Server Certificate Validation Unavailable
-
Server Certificate Validation Failure
-
Invalid Action
- SSLPolicy
-
The SSL policy that handled the connection.
Starting in release 6.7: If TLS server identity discovery is enabled in the access control policy advanced settings, and there is no SSL policy associated
with the access control policy, this field holds none for all SSL events.
- SSLRuleName
-
The SSL rule or default action that handled the connection, as well as the first Monitor rule matched by that connection.
If the connection matched a Monitor rule, the field displays the name of the rule that handled the connection, followed by
the Monitor rule name.
- SSLServerCertStatus
-
This applies only if you configured a Certificate Status SSL rule condition. If encrypted traffic matches an SSL rule, this
field displays one or more of the following server certificate status values:
-
Self Signed
-
Valid
-
Invalid Signature
-
Invalid Issuer
-
Expired
-
Unknown
-
Not Valid Yet
-
Revoked
If undecryptable traffic matches an SSL rule, this field displays Not Checked.
- SSLServerName
-
Hostname of the server with which the client established an encrypted connection.
- SSLSessionID
-
The hexadecimal Session ID negotiated between the client and server during the TLS/SSL handshake.
- SSLTicketID
-
A hexadecimal hash value of the session ticket information sent during the TLS/SSL handshake.
- SSLURLCategory
-
URL categories for the URL visited in the encrypted connection.
If the system identifies or blocks a TLS/SSL application, the requested URL is in encrypted traffic, so the system identifies the traffic based on an SSL certificate.
For TLS/SSL applications, therefore, this field indicates the common name contained in the certificate.
- SSLVersion
-
The TLS/SSL protocol version used to encrypt the connection:
-
Unknown
-
SSLv2.0
-
SSLv3.0
-
TLSv1.0
-
TLSv1.1
-
TLSv1.2
- SSSLCipherSuite
-
A macro value representing a cipher suite used to encrypt the connection. See www.iana.org/assignments/tls-parameters/tls-parameters.xhtml for cipher suite value designations.
- TCPFlags
-
For connections generated from NetFlow data, the TCP flags detected in the connection.
- Tunnel or Prefilter Rule
-
The tunnel rule, prefilter rule, or prefilter policy default action that handled the connection.
- URL
-
The URL requested by the monitored host during the session.
Starting in release 6.7 as an experimental feature:
If the URL column is empty and DNS filtering is enabled, the DNS Query field shows the domain, and the URL Category and URL
Reputation values apply to the domain.
- URLCategory
-
The category, if available, of the URL requested by the monitored host during the session.
Starting in release 6.7 as an experimental feature:
If the URL column is empty and DNS filtering is enabled, the DNS Query field shows the domain, and the URL Category and URL
Reputation values apply to the domain.