# Copyright (c) 2010 Flowerfire, Inc. All Rights Reserved. intel_net_structure_vpngateway = { plugin_version = "1.0.1" # Initial creation - 1.0 # 2010-12-29 - 1.0.1 - MSG - Edited info lines. info.1.manufacturer = "Intel" info.1.device = "NetStructure VPN Gateway" info.1.version.1 = "" # Intel NetStructure VPN Gateway # sessions, hits, bandwidth, pageviews, and visitors. # The name of the log format log.format.format_label = "Intel NetStructure VPN Gateway Log Format" #log_data_type network log.miscellaneous.log_data_type = "syslog_required" log.miscellaneous.log_format_type = "network_device" # The log is in this format if any of the first ten lines match this regular expression log.format.autodetect_regular_expression = ".*\\[(blocked|out-proxy|tunnel|System)\\][^ ]*: " # All log field parsing will be done using the parsing filters log.format.parse_only_with_filters = "true" # A log entry is called an event statistics.miscellaneous.entry_name = "events" # Log fields log.fields = { device = { label = "$lang_stats.field_labels.device" type = "flat" index = 0 subindex = 0 } # device priority = { label = "$lang_stats.field_labels.priority" type = "flat" index = 0 subindex = 0 } # priority protocol = { label = "$lang_stats.field_labels.protocol" type = "flat" index = 0 subindex = 0 } # protocol connection_type = { label = "$lang_stats.field_labels.connection_type" type = "flat" index = 0 subindex = 0 } # connection_type message = { label = "$lang_stats.field_labels.message" type = "flat" index = 0 subindex = 0 } # message server_ip = { label = "$lang_stats.field_labels.server_ip" type = "flat" index = 0 subindex = 0 } # server_ip server_name = { label = "$lang_stats.field_labels.server_name" type = "flat" index = 0 subindex = 0 } # server_name source_ip = { label = "$lang_stats.field_labels.source_ip" type = "host" index = 0 subindex = 0 hierarchy_dividers = "" left_to_right = false leading_divider = "false" } # source_ip source_hostname = { label = "$lang_stats.field_labels.source_hostname" type = "flat" index = 0 subindex = 0 } # source_hostname source_port = { label = "$lang_stats.field_labels.source_port" type = "flat" index = 0 subindex = 0 } # source_port destination_ip = { label = "$lang_stats.field_labels.destination_ip" type = "flat" index = 0 subindex = 0 } # destination_ip destination_hostname = { label = "$lang_stats.field_labels.destination_hostname" type = "flat" index = 0 subindex = 0 } # destination_hostname destination_port = { label = "$lang_stats.field_labels.destination_port" type = "flat" index = 0 subindex = 0 } # destination_port bytes = { label = "$lang_stats.field_labels.bytes" type = "size" index = 0 subindex = 0 hierarchy_dividers = "" left_to_right = false leading_divider = "false" } # bytes } # log.fields # # Log Parsing Filters log.parsing_filters = { # These are the log Parsing filters # Parse out the server name and connection type 1 = { label = "1" comment = "" value = "collect_fields_using_regexp('()([A-Za-z0-9%-]+) *\\\\[([^]]+)\\\\]: ', '*KEY*,server_name,connection_type')" } # 1 # Parse out the source and destination info "from" only types -with domain names 2 = { label = "2" comment = "" value = "collect_fields_using_regexp('()\\\\]: (tcp|udp|icmp) from ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+) \\\\(([^)]+)\\\\) ([^ ]*) to ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+) \\\\(([^)]+)\\\\) ([^ ]*) ([^<]+)<000>$', '*KEY*,protocol,source_ip,source_hostname,source_port,destination_ip,destination_hostname,destination_port,message')" } # 2 # Parse out the source and destination info "from" only types -without domain names 3 = { label = "3" comment = "" value = "collect_fields_using_regexp('()\\\\]: (tcp|udp|icmp) from ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+)-([0-9]+) to ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+)-([0-9]+) ([^<]+)<000>$', '*KEY*,protocol,source_ip,source_port,destination_ip,destination_port,message')" } # 3 # Parse out the source and destination info - secure tunnel attempt -with domain names 4 = { label = "4" comment = "" value = "collect_fields_using_regexp('()\\\\]: ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+) \\\\(([^)]+)\\\\) ([^ ]*) asigned to ([^ ]+) at ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+) \\\\(([^)]+)\\\\) ([^ ]*) ([^<]+)<000>$', '*KEY*,destination_ip,destination_hostname,destination_port,source_hostname,source_ip,message')" } # 4 # Parse out the source and destination info - secure tunnel attempt -without domain names 5 = { label = "5" comment = "" value = "collect_fields_using_regexp('()\\\\]: ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+)-([^ ]*) asigned to ([^ ]+) at ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+)-([^ ]*) ([^<]+)<000>$', '*KEY*,destination_ip,destination_port,source_ip,message')" } # 5 # Parse out the source and destination info - secure tunnel attempt 6 = { label = "6" comment = "" value = "collect_fields_using_regexp('()\\\\]: ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+) \\\\(([^)]+)\\\\) ([^ ]*) released from ([^ ]+) in group [^ ]+ with ([0-9]+) bytes, duration [0-9]+ seconds<000>$', '*KEY*,destination_ip,destination_hostname,destination_port,source_hostname,bytes')" } # 6 # Parse out the source and destination info - secure tunnel established 7 = { label = "7" comment = "" value = "collect_fields_using_regexp('()\\\\]: secure tunnel established with ([^ ]+) \\\\[([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+) \\\\(([^)]+)\\\\) \\\\]<000>$', '*KEY*,destination_hostname,source_ip,source_hostname')" } # 7 # Parse out the source and destination info - secure tunnel time out 8 = { label = "8" comment = "" value = "collect_fields_using_regexp('()\\\\]: Connection to ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+) \\\\(([^ ]+)\\\\) ([^ ]*) \\\\[([^]]+)\\\\] ([^<]+)<000>$', '*KEY*,source_ip,source_hostname,source_port,destination_hostname,message')" } # 8 # Parse out the source and destination info - secure tunnel terminated 9 = { label = "9" comment = "" value = "collect_fields_using_regexp('()\\\\]: Terminating tunnel for ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+) \\\\(([^)]+)\\\\) ([^ ]*) ([^<]+)<000>$', '*KEY*,source_ip,source_hostname,message')" } # 9 # Parse out the source and destination info - unserviced 10 = { label = "10" comment = "" value = "collect_fields_using_regexp('()\\\\]: request for unserviced (tpc|udp|icmp):([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+) \\\\(([^)]+)\\\\) ([^ ]*) from ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+) \\\\(([^)]+)\\\\) ([^ ]*) ([^<]+)<000>$', '*KEY*,protocol,source_ip,source_hostname,source_port,destination_ip,destination_hostname,destination_port,message')" } # 10 # Parse out the source and destination info - unserviced - without revDNS and dest ports 11 = { label = "11" comment = "" value = "collect_fields_using_regexp('()\\\\]: request for unserviced (tpc|udp|icmp):([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+)-([^ ]*) from ([0-9]+\\\\.[0-9]+\\\\.[0-9]+\\\\.[0-9]+) ([^<]+)<000>$', '*KEY*,protocol,source_ip,source_port,destination_ip,message')" } # 11 # Parse out bytes 12 = { label = "12" comment = "" value = "collect_fields_using_regexp('()terminated with ([0-9]+) bytes, duration [0-9]+ seconds<000>$', '*KEY*,bytes')" } # 12 # Parse out bytes 13 = { label = "13" comment = "" value = "collect_fields_using_regexp('()terminated with ([0-9]+) bytes, duration [0-9]+ seconds<000>\\\\\"$', '*KEY*,bytes')" } # 13 # Accept this log entry 14 = { label = "14" comment = "" value = "accept_collected_entry_using_regexp('^()', false)" } # 14 } # log.parsing_filters # Database fields database.fields = { message = { label = "$lang_stats.field_labels.message" log_field = "message" type = "string" suppress_top = 0 suppress_bottom = 2 } # message protocol = { label = "$lang_stats.field_labels.protocol" log_field = "protocol" type = "string" suppress_top = 0 suppress_bottom = 2 } # protocol connection_type = { label = "$lang_stats.field_labels.connection_type" log_field = "connection_type" type = "string" suppress_top = 0 suppress_bottom = 2 } # connection_type server_name = { label = "$lang_stats.field_labels.server_name" log_field = "server_name" type = "string" suppress_top = 0 suppress_bottom = 2 } # server_name source_ip = { label = "$lang_stats.field_labels.source_ip" log_field = "source_ip" type = "string" suppress_top = 0 suppress_bottom = 2 } # source_ip source_hostname = { label = "$lang_stats.field_labels.source_hostname" log_field = "source_hostname" type = "string" suppress_top = 0 suppress_bottom = 2 } # source_hostname source_port = { label = "$lang_stats.field_labels.source_port" log_field = "source_port" type = "string" suppress_top = 0 suppress_bottom = 2 } # source_port destination_ip = { label = "$lang_stats.field_labels.destination_ip" log_field = "destination_ip" type = "string" suppress_top = 0 suppress_bottom = 2 } # destination_ip destination_hostname = { label = "$lang_stats.field_labels.destination_hostname" log_field = "destination_hostname" type = "string" suppress_top = 0 suppress_bottom = 2 } # destination_hostname destination_port = { label = "$lang_stats.field_labels.destination_port" log_field = "destination_port" type = "string" suppress_top = 0 suppress_bottom = 2 } # destination_port } # database.fields # Log Filters log.filters = { 1 = "source_port = replace_all(source_port, '-', ''); destination_port = replace_all(destination_port, '-', '');" 1 = { label = "1" comment = "" value = "if (matches_regular_expression(message, '([^ ]+) with [0-9]+ bytes, duration [0-9]+ seconds')) then message = message;" } # 1 mark_entry = { label = '$lang_admin.log_filters.mark_entry_label' comment = '$lang_admin.log_filters.mark_entry_comment' value = 'events = 1;' } # mark_entry } # log.filters database.numerical_fields = { events = { label = "$lang_stats.field_labels.events" default = true requires_log_field = false type = "int" display_format_type = "integer" entries_field = true } # events visitors = { label = "$lang_stats.field_labels.visitors" default = false requires_log_field = true log_field = "source_ip" type = "unique" display_format_type = "integer" } # visitors bytes = { label = "$lang_stats.field_labels.bytes" default = false requires_log_field = true log_field = "bytes" type = "float" display_format_type = "bandwidth" } # bytes } # database.numerical_fields create_profile_wizard_options = { host_tracking = true # How the reports should be grouped in the report menu report_groups = { date_time_group = "" message = true protocol = true connection_type = true server_name = true source_ip = true source_hostname = true source_port = true destination_ip = true destination_hostname = true destination_port = true } # report_groups } # create_profile_wizard_options not_supported = { sessionpages = true pageviews = true } # not_supported } # intel_net_structure_vpngateway