Forum Discussion
JLospinoso
Jan 03, 2024Copper Contributor
Cisco ASA Events - TCP Build Messages (302013) Not Parsing Correctly
It seems that for the ASA Sentinel is not correctly parsing source and destination IP/Port in TCP or UDP build messages where communication direction is outbound. It doesn't help things that Cisco does not directly label the source and destination in these messages. It's intuitive to read "for IP1/Port1 to IP2/Port2" implying 1 as the source and 2 as the destination but that's not the case.
%ASA-6-302013: Built outbound TCP connection 1139285864 for Outside:104.43.247.104/443 (104.43.247.104/443) to Inside:10.18.120.83/17960 (192.40.44.100/17960).
The rules appear to be as follows:
All FW interfaces have a numeric “Security Context”.
Outbound means the direction was from a higher to lower context.
Inbound means the direction was from a lower to higher context.
The higher context always seems to show as the second interface.
Blending all this together means:
Outbound => src=2 (higher), dst=1 (lower) higher to lower
Inbound => src=1 (lower), dst=2 (higher) lower to higher
So what happens where ip 1 & 2 are on the same interface?
Based on observation where interface1 == interface2:
Outbound => src=2, dst=1
Inbound => src=1, dst=2
In short for outbound messages the source is the second IP and the destination is the first IP.
It's not as clear when the second interface is "identity".
We can imagine that having the source and destination IPs backwards could impact Security Analytics. For example, if a rule was checking destination IPs against a naughty list instead of checking actual external destinations it's going to check the internal (private) IPs and of course never trigger a hit.
Curious to know if anyone else has noticed this?
J-
3 Replies
Sort By
- Clive_WatsonBronze Contributor
Is this from the parsing in the Solution/Rules e.g. Azure-Sentinel/Solutions/CiscoASA/Analytic Rules/CiscoASA-AvgAttackDetectRateIncrease.yaml at bdeb8adf97c39a6ec87267410a91bb72976748a7 · Azure/Azure-Sentinel (github.com)
or from rules that use the the ASIM parser? Azure-Sentinel/Parsers/ASimNetworkSession/Parsers/ASimNetworkSessionCiscoASA.yaml at fe60fd336ce4e8c847e2167cbec952b529faf783 · Azure/Azure-Sentinel (github.com)
- JLospinosoCopper Contributor
Good questions, we're currently using the V1 Cisco ASA Data Connector, 2+ years old now. It may well be that a newer V3 connector fixes this. It's difficult to understand how even a V1 makes it out the door with source and destination IPs reversed, but makes sense to give it a try.
Doesn't seem to be an upgrade button and appears that the Data Connector content has been re-worked, we don't even see all of our connectors under "Data Connectors", it's telling us we have to Centralize our content. We'll have support walk us through that. Thanks, J-
- Clive_WatsonBronze Contributor
You need to look in [Content Hub] not [Data Connectors], it all moved there a while a go