# Copyright (c) 2010 Flowerfire, Inc. All Rights Reserved. cisco_idsnetranger = { plugin_version = "1.0.1" # Initial creation - 1.0 # 2010-10-20 - 1.0.1 - MSG - Edited info lines. info.1.manfacturer = "Cisco Systems" info.1.device = "IDS/NetRanger" info.1.version.1 = "" # Cisco IDS Netranger log # The name of the log format log.format.format_label = "Cisco IDS Netranger Log Format" log.miscellaneous.log_data_type = "network" log.miscellaneous.log_format_type = "network_device" # The log is in this format if any of the first ten lines match this regular expression log.format.autodetect_regular_expression = "^[0-9]+,[0-9]+,[0-9]+/[0-9]+/[0-9]+,[0-9]+:[0-9]+:[0-9]+,[0-9]+/[0-9]+/[0-9]+,[0-9]+:[0-9]+:[0-9]+,[0-9]+,[0-9]+,[0-9]+,[^,]+,[^,]+,[0-9]+,[^,]*" # The format of dates and times in this log log.format.date_format = "yyyy/mm/dd" log.format.time_format = "hh:mm:ss" # All log field parsing will be done using the parsing filters log.format.parse_only_with_filters = "true" # Log fields log.fields = { record_type = { label = "$lang_stats.field_labels.record_type" type = "flat" index = 0 subindex = 0 } # record_type record_id = { label = "$lang_stats.field_labels.record_id" type = "flat" index = 0 subindex = 0 } # record_id date = { label = "$lang_stats.field_labels.date" type = "date" index = 0 subindex = 0 hierarchy_dividers = "" left_to_right = false leading_divider = "false" } # date time = { label = "$lang_stats.field_labels.time" type = "time" index = 0 subindex = 0 hierarchy_dividers = "" left_to_right = false leading_divider = "false" } # time application_id = { label = "$lang_stats.field_labels.application_id" type = "flat" index = 0 subindex = 0 } # application_id host_id = { label = "$lang_stats.field_labels.host_id" type = "flat" index = 0 subindex = 0 } # host_id organization_id = { label = "$lang_stats.field_labels.organization_id" type = "flat" index = 0 subindex = 0 } # organization_id source_direction = { label = "$lang_stats.field_labels.source_direction" type = "flat" index = 0 subindex = 0 } # source_direction destination_direction = { label = "$lang_stats.field_labels.destination_direction" type = "flat" index = 0 subindex = 0 } # destination_direction alarm_level = { label = "$lang_stats.field_labels.alarm_level" type = "flat" index = 0 subindex = 0 } # alarm_level signature_id = { label = "$lang_stats.field_labels.signature_id" type = "flat" index = 0 subindex = 0 } # signature_id subsignature_id = { label = "$lang_stats.field_labels.subsignature_id" type = "flat" index = 0 subindex = 0 } # subsignature_id protocol = { label = "$lang_stats.field_labels.protocol" type = "flat" index = 0 subindex = 0 } # protocol source_ip = { label = "$lang_stats.field_labels.source_ip" type = "host" index = 0 subindex = 0 hierarchy_dividers = "." left_to_right = false leading_divider = "false" } # source_ip destination_ip = { label = "$lang_stats.field_labels.destination_ip" type = "flat" index = 0 subindex = 0 } # destination_ip source_port = { label = "$lang_stats.field_labels.source_port" type = "flat" index = 0 subindex = 0 } # source_port destination_port = { label = "$lang_stats.field_labels.destination_port" type = "flat" index = 0 subindex = 0 } # destination_port router_ip = { label = "$lang_stats.field_labels.router_ip" type = "flat" index = 0 subindex = 0 } # router_ip attack_detail = { label = "$lang_stats.field_labels.attack_detail" type = "flat" index = 0 subindex = 0 } # attack_detail } # log.fields # # Log Parsing Filters log.parsing_filters = { # Parse out the Record Type, Record ID, date, time, Application ID, Host ID,Organization ID, Source direction, Destination Direction, Alarm Level, Signature ID 1 = { label = "1" comment = "" value = "collect_fields_using_regexp('^()([0-9]+),([0-9]+),[0-9]+/[0-9]+/[0-9]+,[0-9]+:[0-9]+:[0-9]+,([0-9]+/[0-9]+/[0-9]+),([0-9]+:[0-9]+:[0-9]+),([0-9]+),([0-9]+),([0-9]*),([^,]+),([^,]+),(23),([^,]*)$', '*KEY*,record_type,record_id,date,time,application_id,host_id,organization_id,source_direction,destination_direction,alarm_level,signature_id')" } # 1 # Parse out the Record Type, Record ID, date, time, Application ID, Host ID,Organization ID, Source direction, Destination Direction, Alarm Level, Signature ID 2 = { label = "2" comment = "" value = "collect_fields_using_regexp('^()([0-9]+),([0-9]+),[0-9]+/[0-9]+/[0-9]+,[0-9]+:[0-9]+:[0-9]+,([0-9]+/[0-9]+/[0-9]+),([0-9]+:[0-9]+:[0-9]+),([0-9]+),([0-9]+),([0-9]*),([^,]+),([^,]+),([0-9]),([0-9]*),([0-9]),([^,]*),([0-9.]*),([0-9.]*),([0-9]*),([0-9]*),([0-9.]*),([^,]*)$', '*KEY*,record_type,record_id,date,time,application_id,host_id,organization_id,source_direction,destination_direction,alarm_level,signature_id,subsignature_id,protocol,source_ip,destination_ip,source_port,destination_port,router_ip,attack_detail')" } # 2 # Accept this collected log entry 3 = { label = "3" comment = "" value = "accept_collected_entry_using_regexp('()', false)" } # 3 } # log.parsing_filters # Database fields database.fields = { date_time = { label = "$lang_stats.field_labels.date_time" log_field = "date_time" type = "string" suppress_top = 0 suppress_bottom = 3 display_format_type = "date_time" } # date_time day_of_week = { label = "$lang_stats.field_labels.day_of_week" log_field = "day_of_week" type = "string" suppress_top = 0 suppress_bottom = 2 display_format_type = "day_of_week" } # day_of_week hour_of_day = { label = "$lang_stats.field_labels.hour_of_day" log_field = "hour_of_day" type = "string" suppress_top = 0 suppress_bottom = 2 display_format_type = "hour_of_day" } # hour_of_day application_id = { label = "$lang_stats.field_labels.application_id" log_field = "application_id" type = "string" suppress_top = 0 suppress_bottom = 2 } # application_id host_id = { label = "$lang_stats.field_labels.host_id" log_field = "host_id" type = "string" suppress_top = 0 suppress_bottom = 2 } # host_id organization_id = { label = "$lang_stats.field_labels.organization_id" log_field = "organization_id" type = "string" suppress_top = 0 suppress_bottom = 2 } # organization_id source_direction = { label = "$lang_stats.field_labels.source_direction" log_field = "source_direction" type = "string" suppress_top = 0 suppress_bottom = 2 } # source_direction destination_direction = { label = "$lang_stats.field_labels.destination_direction" log_field = "destination_direction" type = "string" suppress_top = 0 suppress_bottom = 2 } # destination_direction alarm_level = { label = "$lang_stats.field_labels.alarm_level" log_field = "alarm_level" type = "string" suppress_top = 0 suppress_bottom = 2 } # alarm_level signature_id = { label = "$lang_stats.field_labels.signature_id" log_field = "signature_id" type = "string" suppress_top = 0 suppress_bottom = 2 } # signature_id subsignature_id = { label = "$lang_stats.field_labels.subsignature_id" log_field = "subsignature_id" type = "string" suppress_top = 0 suppress_bottom = 2 } # subsignature_id protocol = { label = "$lang_stats.field_labels.protocol" log_field = "protocol" type = "string" suppress_top = 0 suppress_bottom = 2 } # protocol source_ip = { label = "$lang_stats.field_labels.source_ip" log_field = "source_ip" type = "string" suppress_top = 0 suppress_bottom = 2 } # source_ip destination_ip = { label = "$lang_stats.field_labels.destination_ip" log_field = "destination_ip" type = "string" suppress_top = 0 suppress_bottom = 2 } # destination_ip source_port = { label = "$lang_stats.field_labels.source_port" log_field = "source_port" type = "string" suppress_top = 0 suppress_bottom = 2 } # source_port destination_port = { label = "$lang_stats.field_labels.destination_port" log_field = "destination_port" type = "string" suppress_top = 0 suppress_bottom = 2 } # destination_port router_ip = { label = "$lang_stats.field_labels.router_ip" log_field = "router_ip" type = "string" suppress_top = 0 suppress_bottom = 2 } # router_ip attack_detail = { label = "$lang_stats.field_labels.attack_detail" log_field = "attack_detail" type = "string" suppress_top = 0 suppress_bottom = 2 } # attack_detail } # database.fields # Log Filters log.filters = { mark_entry = { label = '$lang_admin.log_filters.mark_entry_label' comment = '$lang_admin.log_filters.mark_entry_comment' value = 'hits = 1;' } # mark_entry } # log.filters database.numerical_fields = { hits = { label = "$lang_stats.field_labels.hits" default = true requires_log_field = false type = "int" display_format_type = "integer" entries_field = true } # hits visitors = { label = "$lang_stats.field_labels.visitors" default = false requires_log_field = true log_field = "source_ip" type = "unique" display_format_type = "integer" } # visitors } # database.numerical_fields create_profile_wizard_options = { date_time_tracking = true host_tracking = true # How the reports should be grouped in the report menu report_groups = { date_time_group = "" application_id = true host_id = true organization_id = true source_direction = true destination_direction = true alarm_level = true signature_id = true subsignature_id = true protocol = true source_ip = true destination_ip = true source_port = true destination_port = true router_ip = true attack_detail = true } # report_groups } # create_profile_wizard_options not_supported = { sessions = true pageviews = true bandwidth = true } # not_supported } # cisco_idsnetranger