With OSSIM easily analyze network device logs

With OSSIM easily analyze network device logs

 

     Based on the log collection and processing mode plug-in, so users can easily take advantage of OSSIM to analyze a variety of network device logs in heterogeneous network environments, the following examples show some of the hardware device logs, we RAW LOG interface, the search field, enter Cisco Key words, and instantly call up the data source have Cisco routers, firewalls, switches, and other criteria, as long as you know the basic hardware models can be found in the corresponding data source. Firstly Cisco ASA firewall, for example to illustrate for everyone.

 wKioL1ZerayBgt99AADWgrysEaU962.jpg

wKioL1Y5hFOR2TLoAAMI66eCEFA972.jpg

Pie in the system by the various types of logs presented to the user intuitive, easy to access.

wKiom1Y5hRXBYdpDAAJorXyp7NY761.jpg

From the network device logs collected logs, after the plug-normalized, converted into a standardized event,

wKioL1Y5hwqTxu_NAARV2lxlShI903.jpg

wKiom1Y5hsyDtS3GAAT-1Ow89W8866.jpg

wKioL1Y5hwrgHiN0AAMIwMWpRIo558.jpg

This is more than a dozen categories shown above, only the name of the event will be able to guess it. Below, we take ASA: ICMP Denied incident, for example, find out what to see in-depth clues. This ICMP first incident occurred 11,189 times, and each event details as shown below.

wKiom1Y5hsyDbDm6AAM-tUUyG3E987.jpg

In fact, the original log is:

Aug 24 22:26:59 Sensor %ASA-3-313001: Denied ICMP type=8, code=0 from x5.y6.z41.13 on interface outside

If you make a long-term look at these raw log monotonous, certainly I would go crazy. Or Cisco ASA plug-in help to the log processing so agile. Plug in the end is what? Let's look at an example (to OSSIM Cisco ASA plug-in for example)

Plug Location:
/etc/ossim/agent/plugins/cisco-asa.cfg

The plug-Scope:
the Cisco ASA _5500 7.0 7.1 7.2
the Cisco ASA_5510 - all versions

Plug-in ID Number: 1636

Plug-in type: detector

Raw log storage location: /var/log/cisco-asa.log

 Here is the deal with this log regular expression:

wKiom1Y6sEzCh8xZAAIUNVVPaus561.jpg

For in-depth analysis, the next step is to know the frequency and trends of these logs are generated, to achieve it on to Timeline.

wKioL1Y5iSaxGtgqAARn3pir09k912.jpg

Join Filter: filter out all the circumstances of a Cisco ASA event days, with sed, grep command to write a script yet? No, to achieve very Easy! As shown in FIG.

wKioL1ZT5yLikQJBAAW5CQaW74c797.jpg

Cisco switches log collection

wKiom1Y6ASTi0_sSAAS3Zqxab1w520.jpg

 Once the configuration of Cisco equipment is modified, will immediately alarm

wKiom1ZdqsaxOGRaAALlZebiWFk872.jpg

Here is OSSIM collected Fortinet ( Fortinet) firewall logs Category:

wKiom1Y5kTGQl6AxAATaNOqhPok341.jpg

Warehousing wireless AP events

wKiom1Y5kXOAZvduAAQs-ztrIU4774.jpg

 Note: Does not support Chinese log.

Well, the plugin system like this in the end how much Cisco ASA inside it? We look at the following illustration.

wKioL1Y5spTSYWARAA964Fb41Pc785.jpg

OSSIM more interesting content, please refer to the best-selling book "Unix / Linux Network log analysis and traffic monitoring."

This article comes from " Li Chenguang original technology blog " blog, declined reproduced!

Reproduced in: https: //my.oschina.net/chenguang/blog/613902

Guess you like

Origin blog.csdn.net/weixin_34279061/article/details/92045196