Example: Adding IDP Application Information to Attack Logging for Nested Applications (CLI)

Nested application information added to IDP attack logging after “service” and before “rule” provides information on detected Layer 7 applications. In the following example, “Facebook” appears in the log file as nested application information.

Aug 29 20:46:32 4.0.0.254 RT_IDP: IDP_ATTACK_LOG_EVENT: IDP: at 1251603992, SIG Attack log <4.0.0.1:33000->5.0.0.1:210> for TCP protocol and service SERVICE_IDP application FACEBOOK by rule 1 of rulebase IPS in policy idpengine. attack: repeat=0, action=NONE, severity=MEDIUM, name=http-url-attack-test, NAT <8.11.163.220:0->0.0.0.0:0>, time-elapsed=0, inbytes=0, outbytes=0, inpackets=0, outpackets=0, intf:untrust:ge-0/0/1.0->trust:ge-0/0/0.0, and misc-message -

Note: For further information on IDP logging, refer to Understanding IDP Logging.

Related Topics