Barracuda (WAF) Template
Using the Access Log Events
The following table shows the Access Log Events on which the template can be used to control the information that is received and actioned in your security schema.
Action |
Subaction |
Condition (Line Matching) |
User Activity | ||
Network Access |
Network Access Accepted |
.* |
Access Log Events Variable Selections and Mapping
These fields configure how the original event fields are mapped into the normalized variables using the CEF Syslog Receiver. If you want to enrich the event using default values, leave the "Value" text box empty and the configured "Default Value" will be used instead.
VARIABLE | VALUE |
---|---|
Event Time (Source Timezone) | [Event.Event_Time_(Source_Timezone)] |
Event timezone offset | [Event.Event_timezone_offset] |
Complete Message | [Event.Raw_Message] |
Operator Name | [[CEF.duser] |
User Name | [CEF.suser] |
Source Machine IP Address | [CEF.src] |
Destination Machine Name | [CEF.dhost] |
Session ID | [CEF.suid] |
Application | [CEF.app] |
Variable 01 | Log type: [CEF.cat] |
Variable 02 | Service IP: [CEF.dvc] |
Variable 03 | Service Port: [CEF.cn1] |
Variable 04 | Client IP: [CEF.src] |
Variable 05 | Client Port: [CEF.spt] |
Variable 06 | Login: [CEF.suid] |
Variable 07 | Certificate User: [CEF.suser] |
Variable 08 | Method: [CEF.requestMethod] |
Variable 09 | Protocol: [CEF.app] |
Variable 10 | Host: [CEF.dhost] |
Variable 11 | Version: [CEF.flexString1] |
Variable 12 | HTTP status: [CEF.outcome] |
Variable 13 | Bytes sent: [CEF.in] |
Variable 14 | Bytes Received: [CEF.out] |
Variable 15 | Cache Hit: [CEF.cn2] |
Variable 16 | Time Taken (ms): [CEF.flexNumber2] |
Variable 17 | Server IP: [CEF.dst] |
Variable 18 | Server Port: [CEF.dpt] |
Variable 19 | Server Time (ms): [CEF.flexNumber1] |
Variable 20 | Session ID: [CEF.BarracudaWafSessionID] |
Variable 21 | Response Type: [CEF.BarracudaWafResponseType] |
Variable 22 | Profile Matched: [CEF.cs4] |
Variable 23 | Protected: [CEF.cs2] |
Variable 24 | WF Matched: [CEF.cs6] |
Variable 25 | URL: [CEF.request] |
Variable 26 | Query String: [CEF.msg] |
Variable 27 | Referrer: [CEF.requestContext] |
Variable 28 | Cookie: [CEF.requestCookies] |
Variable 29 | User Agent: [CEF.requestClientApplicat |
Variable 30 | Proxy IP: [CEF.cs3] |
Variable 31 | Proxy Port: [CEF.cn3] |
Variable 32 | Authenticated User: [CEF.duser] |
Variable 33 | Custom Header 1: [CEF.BarracudaWafCustomHeader1] |
Variable 34 | Custom Header 2: [CEF.BarracudaWafCustomHeader2] |
Variable 35 | Custom Header 3: [CEF.BarracudaWafCustomHeader3] |
Using the Audit Logs
The following table shows the Audit Logs on which the template can be used to control the information that is received and actioned in your security schema.
Action |
Subaction |
Condition (Line Matching) |
System Management | ||
Configuration Rule Modification |
Configuration Rule Modifcation |
.*\|CONFIG\|.*outcome=SET.* |
Configuration Rule Modification | Restore Configuration | .*\|(?:RESTORE|ROLLBACK)\|.* |
Configuration Rule Modification | Version Modification | .*\|(?:FIRMWARE UPDATE|ENERGIZE UPDATE|FIRMWARE APPLY|FIRMWARE REVERT)\|.* |
Configuration Rule Creation | Configuration Rule Creation | .*\|CONFIG\|.*outcome=ADD.* |
Configuration Rule Deletion | Configuration Rule Deletion | .*\|CONFIG\|.*outcome=DELETE* |
Object Creation | Open Support Tunnel | .*\|SUPPORT TUNNEL OPEN\|.* |
Object Deletion | Close Support Tunnel | .*\|SUPPORT TUNNEL CLOSE\|.* |
System Shutdown | System Shutdown | .*\|SHUTDOWN\|.* |
System Start | System Reboot | .*\|REBOOT\|.* |
User Activity | ||
Logoff | Logoff | .*\|LOGOUT\|.* |
Logon Failure | Logon Failure | .*\|UNSUCCESSFUL LOGIN\|.* |
Successful Login | Successful Login | .*\|LOGIN\|.* |
Network Access | Network Access Rejected | .*\|ADMIN ACCESS VIOLATION\|.* |
User Statement | Command Execution | .*\|COMMAND\|.* |
Audit Logs Variable Selections and Mapping
These fields configure how the original event fields are mapped into the normalized variables using the CEF Syslog Receiver. If you want to enrich the event using default values, leave the "Value" text box empty and the configured "Default Value" will be used instead.
VARIABLE | VALUE |
---|---|
Event Time (Source Timezone) | [Event.Event_Time_(Source_Timezone)] |
Event timezone offset | [Event.Event_timezone_offset] |
Complete Message | [Event.Raw_Message] |
Variable 01 | Unit Name: [CEF.dvchost] |
Variable 02 | Log Type: [CEF.cat] |
Variable 03 | Admin Name: [CEF.duser] |
Variable 04 | Client Type: [CEF.requestClientApplication] |
Operator Name | [CEF.duser] |
Source Machine IP Address | [CEF.src] |
Event ID | [CEF.cn1] |
Object Name | [CEF.fname] |
Object Type | [CEF.fileType] |
Previous Value | [CEF.cs2] |
Current Value | [CEF.cs1] |
Application | [CEF.deviceProcessName] |
Variable 06 | Client Port: [CEF.spt] |
Variable 07 | Service IP: [CEF.dst] |
Variable 08 | Service Port: [CEF.dpt] |
Variable 09 | Rule: [CEF.cs1] |
Variable 17 | Additional Data: [CEF.msg] |
Variable 10 | Change type: [CEF.outcome] |
Variable 16 | New Value: [CEF.cs1] |
Variable 11 | Object Type: [CEF.fileType] |
Variable 15 | Old Value: [CEF.cs2] |
Variable 12 | Object Name: [CEF.fname] |
Variable 13 | URL: [CEF.request] |
Variable 14 | Variable: [CEF.cs3] |
Variable 05 | Transaction Type: [CEF.Name] |
Using the Network Firewall Logs
The following table shows the Network Firewall Logs on which the template can be used to control the information that is received and actioned in your security schema.
Action |
Subaction |
Condition (Line Matching) |
User Activity | ||
Network Access |
Network Access Accepted |
.*act=ALLOW.* |
Network Access | Network Access Rejected | .*act=DENY.* |
Network Firewall Logs Variable Selections and Mapping
These fields configure how the original event fields are mapped into the normalized variables using the CEF Syslog Receiver. If you want to enrich the event using default values, leave the "Value" text box empty and the configured "Default Value" will be used instead.
VARIABLE | VALUE |
---|---|
Event Time (Source Timezone) | [Event.Event_Time_(Source_Timezone)] |
Event timezone offset | [Event.Event_timezone_offset] |
Complete Message | [Event.Raw_Message] |
Variable 01 | Unit Name: [CEF.dvchost] |
Variable 02 | Log Type: [CEF.cat] |
Variable 03 | Protocol: [CEF.proto] |
Variable 04 | Source IP: [CEF.src] |
Variable 05 | Source Port: [CEF.spt] |
Variable 06 | Destination IP: [CEF.dst] |
Variable 07 | Destination Port: [CEF.dpt] |
Variable 08 | ACL Policy: [CEF.act] |
Variable 09 | Details: [CEF.cs1] |
Protocol | [CEF.proto] |
Source Machine IP Address | [CEF.src] |
Destination Machine IP Address | [CEF.dst] |
Additional Information 1 | [CEF.cs1] |
Using the System Logs
The following table shows the System Logs on which the template can be used to control the information that is received and actioned in your security schema.
Action |
Subaction |
Condition (Line Matching) |
User Activity | ||
Network Access |
Network Access Monitored |
.*act=LOG.* |
Network Access | Network Access Suspected | .*act=WARNING.* |
Network Access | Network Access Rejected | .*act=DENY.* |
System Logs Variable Selections and Mapping
These fields configure how the original event fields are mapped into the normalized variables using the CEF Syslog Receiver. If you want to enrich the event using default values, leave the "Value" text box empty and the configured "Default Value" will be used instead.
VARIABLE | VALUE |
---|---|
Event Time (Source Timezone) | [Event.Event_Time_(Source_Timezone)] |
Event timezone offset | [Event.Event_timezone_offset] |
Complete Message | [Event.Raw_Message] |
Variable 01 | Unit Name: [CEF.dvchost] |
Variable 02 | Log Type: [CEF.cat] |
Event ID | [CEF.externalId] |
Additional Information 1 | [CEF.msg] |
Using the Web Firewall Logs
The following table shows the Web Firewall Logs on which the template can be used to control the information that is received and actioned in your security schema.
Action |
Subaction |
Condition (Line Matching) |
User Activity | ||
Network Access |
Network Access Monitored |
.*act=LOG.* |
Network Access | Network Access Suspected | .*act=WARNING.* |
Network Access | Network Access Rejected | .*act=DENY.* |
Web Firewall Logs Variable Selections and Mapping
These fields configure how the original event fields are mapped into the normalized variables using the CEF Syslog Receiver. If you want to enrich the event using default values, leave the "Value" text box empty and the configured "Default Value" will be used instead.
VARIABLE | VALUE | DEFAULT VALUE |
---|---|---|
Event Time (Source Timezone) | [Event.Event_Time_(Source_Timezone)] | |
Event timezone offset | [Event.Event_timezone_offset] | |
Complete Message | [Event.Raw_Message] | |
Operator Name | [CEF.duser] | |
Source Machine IP Address | [CEF.src] | |
Application | [CEF.app] | |
Variable 01 | Unit Name: [CEF.dvchost] | |
Variable 02 | Log Type: [CEF.cat] | |
Variable 03 | Severity: [CEF.Severity] | |
Variable 04 | Attack type: [CEF.cs4] | |
Variable 05 | Client IP: [CEF.src] | |
Variable 22 | Referrer: [CEF.requestContext] | |
Variable 20 | Authenticated User: [CEF.duser] | |
Variable 19 | Proxy Port: [CEF.cn2] | |
Variable 18 | Proxy IP: [CEF.cs5] | |
Variable 17 | User Agent: [CEF.requestClientApplication] | |
Variable 16 | Session ID: [CEF.cs6] | |
Variable 15 | Protocol: [CEF.app] | |
Variable 14 | URL: [CEF.request] | |
Variable 13 | Method: [CEF.requestMethod] | |
Variable 12 | Attack details [CEF.msg] | |
Variable 11 | Action; [CEF.act] | |
Variable 10 | Rule Type: [CEF.cs3] | |
Variable 09 | Rule: [CEF.cs1] | |
Variable 08 | Service Port: [CEF.dpt] | |
Variable 07 | Service IP: [CEF.dst] | |
Variable 06 | Client Port: [CEF.spt] | |
Destination Machine IP Address | [CEF.dst] | |
Object Name | [CEF.cs4] | |
Object Type | Attack |