<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CIsco IPS 4200 Log Fields in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-ips-4200-log-fields/m-p/997722#M79382</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could anyone please tell me where can I find the information regarding the Fields of the log for IPS 4200? In what sequence do they appear in log files and what does each field signify?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, I need the layout of the log file for the IPS logs. e.g. a sample layout would be something like this:&lt;/P&gt;&lt;P&gt;[timestamp] , [signatureID] , [vendor] [signature desc], [attacker IP] , [victim IP] , [attack type] , [action ID] , [action desc]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pratik&lt;/P&gt;</description>
    <pubDate>Sun, 10 Mar 2019 11:12:15 GMT</pubDate>
    <dc:creator>pratik.jadav</dc:creator>
    <dc:date>2019-03-10T11:12:15Z</dc:date>
    <item>
      <title>CIsco IPS 4200 Log Fields</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ips-4200-log-fields/m-p/997722#M79382</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could anyone please tell me where can I find the information regarding the Fields of the log for IPS 4200? In what sequence do they appear in log files and what does each field signify?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically, I need the layout of the log file for the IPS logs. e.g. a sample layout would be something like this:&lt;/P&gt;&lt;P&gt;[timestamp] , [signatureID] , [vendor] [signature desc], [attacker IP] , [victim IP] , [attack type] , [action ID] , [action desc]&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pratik&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 11:12:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ips-4200-log-fields/m-p/997722#M79382</guid>
      <dc:creator>pratik.jadav</dc:creator>
      <dc:date>2019-03-10T11:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco IPS 4200 Log Fields</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ips-4200-log-fields/m-p/997723#M79383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Pratik -&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are two ways of getting event messages out of a sensor. The standard is SDEE, which is just XML that you can look inside to see the tags on each field. They like to call it "self documenting". The second (and more difficult because it requires you to tune each active signature) is syslog.&lt;/P&gt;&lt;P&gt;Which log format are you looking for?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jul 2008 15:09:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ips-4200-log-fields/m-p/997723#M79383</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2008-07-18T15:09:49Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco IPS 4200 Log Fields</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ips-4200-log-fields/m-p/997724#M79384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks rhermes.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am more interested in the fields that are there in the logs and not the actual format of the log. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am trying to find out what information is available in the logs. e.g. attacker IP, victim IP, signatureID etc... &lt;/P&gt;&lt;P&gt;the format of the logs (SDEE/syslog) doesnt matter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Total of how many fields are there for each log and what does each field mean.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am really sorry if this sounds silly but I am new to the IPS stuff and couldnt get the info I wanted on the cisco site.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please let me know if anyone could pls share this info with me. It would be really helpful to me.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Pratik&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jul 2008 15:48:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ips-4200-log-fields/m-p/997724#M79384</guid>
      <dc:creator>pratik.jadav</dc:creator>
      <dc:date>2008-07-18T15:48:04Z</dc:date>
    </item>
    <item>
      <title>Re: CIsco IPS 4200 Log Fields</title>
      <link>https://community.cisco.com/t5/network-security/cisco-ips-4200-log-fields/m-p/997725#M79387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Here's an example of an SDEE message. I believe this is from a version 5.x sensor (it could be version 4, I don't see Risk Rating). Each time a new major version of software is release, new features are added and (if reportable) they show up as new fields in the SDEE messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- &lt;EVALERT eventid="1159163097352391996" severity="medium"&gt;&lt;/EVALERT&gt;&lt;/P&gt;&lt;P&gt;- &lt;ORIGINATOR&gt;&lt;/ORIGINATOR&gt;&lt;/P&gt;&lt;P&gt;  &lt;HOSTID&gt;testsensor4250XL&lt;/HOSTID&gt; &lt;/P&gt;&lt;P&gt;  &lt;APPNAME&gt;sensorApp&lt;/APPNAME&gt; &lt;/P&gt;&lt;P&gt;  &lt;APPINSTANCEID&gt;440&lt;/APPINSTANCEID&gt; &lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;  &lt;ALERTVERSION&gt;Sdee&lt;/ALERTVERSION&gt; &lt;/P&gt;&lt;P&gt;  &lt;ORIGIPADDR&gt;10.1.1.119&lt;/ORIGIPADDR&gt; &lt;/P&gt;&lt;P&gt;  &lt;TIME offset="0" timezone="UTC"&gt;1180958240541285000&lt;/TIME&gt; &lt;/P&gt;&lt;P&gt;  &lt;ALERTSENDER name="Sensor3"&gt;10.1.1.119&lt;/ALERTSENDER&gt; &lt;/P&gt;&lt;P&gt;  &lt;SIGNATURE sigid="12009" signame="MarketScore Activity" version="S130" subsigid="0"&gt;&lt;/SIGNATURE&gt; &lt;/P&gt;&lt;P&gt;  &lt;INTERFACEGROUP&gt;&lt;/INTERFACEGROUP&gt; &lt;/P&gt;&lt;P&gt;  &lt;VLAN&gt;0&lt;/VLAN&gt; &lt;/P&gt;&lt;P&gt;  &lt;SUMMARY summarytype="" initialalert="0" final="false"&gt;1&lt;/SUMMARY&gt; &lt;/P&gt;&lt;P&gt;- &lt;CONTEXT&gt;&lt;/CONTEXT&gt;&lt;/P&gt;&lt;P&gt;  &lt;FROMVICTIM&gt;&lt;/FROMVICTIM&gt; &lt;/P&gt;&lt;P&gt;  &lt;FROMATTACKER&gt;R0VUIC9vc3Mvc3VydmV5LmFzcD7pdW1kYXlzPTUrMyBIVFRQ0=&lt;/FROMATTACKER&gt; &lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;- &lt;PARTICIPANTS&gt;&lt;/PARTICIPANTS&gt;&lt;/P&gt;&lt;P&gt;- &lt;ATTACK totalattackers="1" totalvictims="1"&gt;&lt;/ATTACK&gt;&lt;/P&gt;&lt;P&gt;- &lt;ATTACKER totalports="1" proxy="false"&gt;&lt;/ATTACKER&gt;&lt;/P&gt;&lt;P&gt;  &lt;ADDR locality="IN"&gt;11.1.1.2&lt;/ADDR&gt; &lt;/P&gt;&lt;P&gt;  &lt;PORT&gt;60556&lt;/PORT&gt; &lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;- &lt;VICTIM totalports="1"&gt;&lt;/VICTIM&gt;&lt;/P&gt;&lt;P&gt;  &lt;ADDR locality="OUT"&gt;61.1.1.76&lt;/ADDR&gt; &lt;/P&gt;&lt;P&gt;  &lt;PORT&gt;80&lt;/PORT&gt; &lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;  &lt;/P&gt;&lt;P&gt;  &lt;ALERTDETAILS&gt;&lt;/ALERTDETAILS&gt; &lt;/P&gt;&lt;P&gt;   &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 18 Jul 2008 21:25:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-ips-4200-log-fields/m-p/997725#M79387</guid>
      <dc:creator>rhermes</dc:creator>
      <dc:date>2008-07-18T21:25:17Z</dc:date>
    </item>
  </channel>
</rss>

