Skip to content

Instantly share code, notes, and snippets.

@adriansr
Created April 22, 2020 14:10
Show Gist options
  • Save adriansr/550c9c9c0105fedd1dbd62472a140247 to your computer and use it in GitHub Desktop.
Save adriansr/550c9c9c0105fedd1dbd62472a140247 to your computer and use it in GitHub Desktop.
// Copyright Elasticsearch B.V. and/or licensed to Elasticsearch B.V. under one
// or more contributor license agreements. Licensed under the Elastic License;
// you may not use this file except in compliance with the Elastic License.
var processor = require("processor");
var console = require("console");
var device;
// Register params from configuration.
function register(params) {
device = new DeviceProcessor();
}
function process(evt) {
return device.process(evt);
}
function DeviceProcessor() {
var builder = new processor.Chain();
builder.Add(save_flags);
builder.Add(chain1);
builder.Add(restore_flags);
var chain = builder.Build();
return {
process: chain.Run,
}
}
var map_srcDirName = {
keyvaluepairs: {
"0": dup477,
"1": dup476,
},
};
var map_dstDirName = {
keyvaluepairs: {
"0": dup476,
"1": dup477,
},
};
var map_dir2SumType = {
keyvaluepairs: {
"0": constant("2"),
"1": constant("3"),
},
"default": constant("0"),
};
var map_dir2Address = {
keyvaluepairs: {
"0": field("saddr"),
"1": field("daddr"),
},
"default": field("saddr"),
};
var map_dir2Port = {
keyvaluepairs: {
"0": field("sport"),
"1": field("dport"),
},
"default": field("sport"),
};
var dup0 = set_field({
dest: "nwparser.messageid",
value: constant("CISCOASA_GENERIC"),
});
var dup1 = set_field({
dest: "nwparser.eventcategory",
value: constant("1601000000"),
});
var dup2 = call({
dest: "nwparser.level",
fn: HDR,
args: [
field("level"),
],
});
var dup3 = date_time({
dest: "event_time",
args: ["month","day","year","hhour","hmin","hsec"],
fmt: [dB,dF,dW,dN,dU,dO],
});
var dup4 = set_field({
dest: "nwparser.msg",
value: field("$MSG"),
});
var dup5 = call({
dest: "nwparser.id",
fn: HDR,
args: [
field("messageid"),
],
});
var dup6 = set_field({
dest: "nwparser.eventcategory",
value: constant("1501050100"),
});
var dup7 = set_field({
dest: "nwparser.event_type",
value: constant("VPN"),
});
var dup8 = set_field({
dest: "nwparser.event_description",
value: constant("Static Crypto Map check"),
});
var dup9 = match({
id: "MESSAGE#1042:715077/0",
dissect: {
tokenizer: "%{->}Group = %{p0->}",
field: "nwparser.payload",
},
});
var dup10 = set_field({
dest: "nwparser.eventcategory",
value: constant("1603000000"),
});
var dup11 = set_field({
dest: "nwparser.ec_theme",
value: constant("Encryption"),
});
var dup12 = set_field({
dest: "nwparser.ec_subject",
value: constant("CryptoKey"),
});
var dup13 = set_field({
dest: "nwparser.ec_activity",
value: constant("Modify"),
});
var dup14 = call({
dest: "nwparser.",
fn: SYSVAL,
args: [
field("$MSGID"),
field("$ID1"),
],
});
var dup15 = match({
id: "MESSAGE#192:113015/1",
dissect: {
tokenizer: "%{username->} ",
field: "nwparser.p0",
},
});
var dup16 = set_field({
dest: "nwparser.eventcategory",
value: constant("1301000000"),
});
var dup17 = set_field({
dest: "nwparser.ec_subject",
value: constant("User"),
});
var dup18 = set_field({
dest: "nwparser.ec_theme",
value: constant("Authentication"),
});
var dup19 = set_field({
dest: "nwparser.ec_outcome",
value: constant("Failure"),
});
var dup20 = set_field({
dest: "nwparser.eventcategory",
value: constant("1605000000"),
});
var dup21 = set_field({
dest: "nwparser.eventcategory",
value: constant("1801000000"),
});
var dup22 = match({
id: "MESSAGE#872:713066/0",
dissect: {
tokenizer: "Group = %{group->}, Username = %{p0->}",
field: "nwparser.payload",
},
});
var dup23 = linear_select([
match({
id: "MESSAGE#872:713066/2",
dissect: {
tokenizer: "'%{username->}' , IP = %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#872:713066/2",
dissect: {
tokenizer: "%{username->} , IP = %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup24 = set_field({
dest: "nwparser.eventcategory",
value: constant("1204020000"),
});
var dup25 = date_time({
dest: "event_time",
args: ["month","day","year","hhour","hmin","hsec"],
fmt: [dB,dF,dW,dH,dT,dS],
});
var dup26 = set_field({
dest: "nwparser.eventcategory",
value: constant("1001020100"),
});
var dup27 = call({
dest: "nwparser.inout",
fn: DIRCHK,
args: [
field("saddr"),
],
});
var dup28 = lookup({
dest: "nwparser.src_zone",
map: map_srcDirName,
key: field("inout"),
});
var dup29 = lookup({
dest: "nwparser.dst_zone",
map: map_dstDirName,
key: field("inout"),
});
var dup30 = call({
dest: "nwparser.sigcat",
fn: SYSVAL,
args: [
field("$CATEGORY"),
],
});
var dup31 = match({
id: "MESSAGE#719:602304/0",
dissect: {
tokenizer: "%{service->}: An %{direction->} SA (SPI= %{fld1->}) between %{saddr->} and %{daddr->} %{p0->}",
field: "nwparser.payload",
},
});
var dup32 = linear_select([
match({
id: "MESSAGE#719:602304/2",
dissect: {
tokenizer: "(user=%{username->}) %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#719:602304/2",
dissect: {
tokenizer: "(%{username->}) %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#719:602304/2",
dissect: {
tokenizer: "'%{username->}' %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#719:602304/2",
dissect: {
tokenizer: "%{username->} %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup33 = match({
id: "MESSAGE#719:602304/2",
dissect: {
tokenizer: "%{action->}",
field: "nwparser.p1",
},
});
var dup34 = set_field({
dest: "nwparser.eventcategory",
value: constant("1801030100"),
});
var dup35 = date_times({
dest: "event_time",
args: ["month","day","year","hhour","hmin","hsec"],
fmts: [
[dB,dF,dW,dN,dU,dO],
[dB,dF,dN,dU,dO],
],
});
var dup36 = set_field({
dest: "nwparser.eventcategory",
value: constant("1801030000"),
});
var dup37 = set_field({
dest: "nwparser.eventcategory",
value: constant("1604000000"),
});
var dup38 = set_field({
dest: "nwparser.ec_theme",
value: constant("Configuration"),
});
var dup39 = set_field({
dest: "nwparser.ec_subject",
value: constant("Configuration"),
});
var dup40 = set_field({
dest: "nwparser.ec_outcome",
value: constant("Success"),
});
var dup41 = set_field({
dest: "nwparser.eventcategory",
value: constant("1801010000"),
});
var dup42 = set_field({
dest: "nwparser.ec_theme",
value: constant("ALM"),
});
var dup43 = set_field({
dest: "nwparser.ec_subject",
value: constant("NetworkComm"),
});
var dup44 = match({
id: "MESSAGE#921:713194/0",
dissect: {
tokenizer: "%{->} %{p0->}",
field: "nwparser.payload",
},
});
var dup45 = match({
id: "MESSAGE#921:713194/2",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{p1->}",
field: "nwparser.p0",
},
});
var dup46 = match({
id: "MESSAGE#921:713194/2",
dissect: {
tokenizer: "IP = %{saddr->}, %{p1->}",
field: "nwparser.p0",
},
});
var dup47 = linear_select([
match({
id: "MESSAGE#1020:715048/2",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1020:715048/2",
dissect: {
tokenizer: "IP = %{saddr->}, %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup48 = match({
id: "MESSAGE#1020:715048/2",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.p1",
},
});
var dup49 = set_field({
dest: "nwparser.eventcategory",
value: constant("1603010000"),
});
var dup50 = set_field({
dest: "nwparser.eventcategory",
value: constant("1603040000"),
});
var dup51 = set_field({
dest: "nwparser.eventcategory",
value: constant("1703000000"),
});
var dup52 = set_field({
dest: "nwparser.eventcategory",
value: constant("1001020200"),
});
var dup53 = match({
id: "MESSAGE#1250:737031/0",
dissect: {
tokenizer: "%{process->}: %{p0->}",
field: "nwparser.payload",
},
});
var dup54 = linear_select([
match({
id: "MESSAGE#1250:737031/2",
dissect: {
tokenizer: "Session=%{sessionid->}, %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup55 = set_field({
dest: "nwparser.eventcategory",
value: constant("1801010100"),
});
var dup56 = set_field({
dest: "nwparser.service",
value: constant("IPSEC"),
});
var dup57 = match({
id: "MESSAGE#700:505015/1",
dissect: {
tokenizer: "%{application->}\", %{info->}",
field: "nwparser.p0",
},
});
var dup58 = set_field({
dest: "nwparser.eventcategory",
value: constant("1605020000"),
});
var dup59 = set_field({
dest: "nwparser.eventcategory",
value: constant("1701060000"),
});
var dup60 = set_field({
dest: "nwparser.ec_activity",
value: constant("Enable"),
});
var dup61 = linear_select([
match({
id: "MESSAGE#128:109007/2",
dissect: {
tokenizer: "'%{username->}' from %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#128:109007/2",
dissect: {
tokenizer: "%{username->} from %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup62 = match({
id: "MESSAGE#128:109007/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->} to %{daddr->}/%{dport->} on interface %{interface->}",
field: "nwparser.p1",
},
});
var dup63 = set_field({
dest: "nwparser.eventcategory",
value: constant("1401060000"),
});
var dup64 = set_field({
dest: "nwparser.ec_activity",
value: constant("Permit"),
});
var dup65 = set_field({
dest: "nwparser.ec_theme",
value: constant("AccessControl"),
});
var dup66 = linear_select([
match({
id: "MESSAGE#351:304001/2",
dissect: {
tokenizer: "'%{username->}' @%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#351:304001/2",
dissect: {
tokenizer: "%{username->} @%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup67 = set_field({
dest: "nwparser.eventcategory",
value: constant("1204010000"),
});
var dup68 = set_field({
dest: "nwparser.event_description",
value: constant("Accessed"),
});
var dup69 = set_field({
dest: "nwparser.protocol",
value: constant("HTTP"),
});
var dup70 = call({
dest: "nwparser.urldomain",
fn: URL,
args: [
field("$DOMAIN"),
field("url"),
],
});
var dup71 = call({
dest: "nwparser.urlroot",
fn: URL,
args: [
field("$ROOT"),
field("url"),
],
});
var dup72 = call({
dest: "nwparser.urlpage",
fn: URL,
args: [
field("$PAGE"),
field("url"),
],
});
var dup73 = call({
dest: "nwparser.urlquery",
fn: URL,
args: [
field("$QUERY"),
field("url"),
],
});
var dup74 = set_field({
dest: "nwparser.eventcategory",
value: constant("1001020300"),
});
var dup75 = set_field({
dest: "nwparser.eventcategory",
value: constant("1603110000"),
});
var dup76 = set_field({
dest: "nwparser.eventcategory",
value: constant("1001030300"),
});
var dup77 = match({
id: "MESSAGE#1046:716002/0",
dissect: {
tokenizer: "Group \u003c\u003c%{group->}> User %{p0->}",
field: "nwparser.payload",
},
});
var dup78 = linear_select([
match({
id: "MESSAGE#1046:716002/2",
dissect: {
tokenizer: "\u003c\u003c%{username->}> IP \u003c\u003c%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1046:716002/2",
dissect: {
tokenizer: "'%{username->}' IP \u003c\u003c%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1046:716002/2",
dissect: {
tokenizer: "%{username->} IP \u003c\u003c%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup79 = match({
id: "MESSAGE#992:715006/0",
dissect: {
tokenizer: "Group = %{group->}, %{p0->}",
field: "nwparser.payload",
},
});
var dup80 = linear_select([
match({
id: "MESSAGE#992:715006/2",
dissect: {
tokenizer: "Username = '%{username->}', IP = %{saddr->}, %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#992:715006/2",
dissect: {
tokenizer: "Username = %{username->}, IP = %{saddr->}, %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#992:715006/2",
dissect: {
tokenizer: "IP = %{saddr->}, %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup81 = match({
id: "MESSAGE#992:715006/2",
dissect: {
tokenizer: "%{action->}: SPI = %{dst_spi->}",
field: "nwparser.p1",
},
});
var dup82 = set_field({
dest: "nwparser.eventcategory",
value: constant("1801020100"),
});
var dup83 = set_field({
dest: "nwparser.eventcategory",
value: constant("1304000000"),
});
var dup84 = set_field({
dest: "nwparser.eventcategory",
value: constant("1401050200"),
});
var dup85 = set_field({
dest: "nwparser.eventcategory",
value: constant("1002000000"),
});
var dup86 = set_field({
dest: "nwparser.eventcategory",
value: constant("1303000000"),
});
var dup87 = set_field({
dest: "nwparser.ec_outcome",
value: constant("Error"),
});
var dup88 = match({
id: "MESSAGE#804:702201:01/0",
dissect: {
tokenizer: "ISAKMP Phase 1 delete%{p0->}",
field: "nwparser.payload",
},
});
var dup89 = linear_select([
match({
id: "MESSAGE#804:702201:01/2",
dissect: {
tokenizer: "d%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup90 = set_field({
dest: "nwparser.event_description",
value: constant("Phase 1 delete received"),
});
var dup91 = set_field({
dest: "nwparser.event_description",
value: constant("Remote peer has failed user authentication"),
});
var dup92 = linear_select([
match({
id: "MESSAGE#1196:725009:01/2",
dissect: {
tokenizer: "server%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1196:725009:01/2",
dissect: {
tokenizer: "client%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup93 = set_field({
dest: "nwparser.event_description",
value: constant("Device proposes cipher(s)"),
});
var dup94 = set_field({
dest: "nwparser.eventcategory",
value: constant("1805020000"),
});
var dup95 = set_field({
dest: "nwparser.eventcategory",
value: constant("1805000000"),
});
var dup96 = match({
id: "MESSAGE#143:109019/0",
dissect: {
tokenizer: "Downloaded ACL %{p0->}",
field: "nwparser.payload",
},
});
var dup97 = match({
id: "MESSAGE#143:109019/2",
dissect: {
tokenizer: "%{info->}",
field: "nwparser.p1",
},
});
var dup98 = set_field({
dest: "nwparser.eventcategory",
value: constant("1501040000"),
});
var dup99 = set_field({
dest: "nwparser.ec_activity",
value: constant("Deny"),
});
var dup100 = set_field({
dest: "nwparser.event_description",
value: constant("Authorization denied"),
});
var dup101 = set_field({
dest: "nwparser.eventcategory",
value: constant("1803010000"),
});
var dup102 = set_field({
dest: "nwparser.ec_theme",
value: constant("Communication"),
});
var dup103 = set_field({
dest: "nwparser.event_description",
value: constant("session limit exceeded"),
});
var dup104 = linear_select([
match({
id: "MESSAGE#170:111006/2",
dissect: {
tokenizer: "'%{username->}' at %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#170:111006/2",
dissect: {
tokenizer: "%{username->} at %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup105 = set_field({
dest: "nwparser.eventcategory",
value: constant("1401050100"),
});
var dup106 = set_field({
dest: "nwparser.ec_activity",
value: constant("Logon"),
});
var dup107 = set_field({
dest: "nwparser.eventcategory",
value: constant("1701030000"),
});
var dup108 = set_field({
dest: "nwparser.ec_activity",
value: constant("Delete"),
});
var dup109 = set_field({
dest: "nwparser.eventcategory",
value: constant("1103000000"),
});
var dup110 = set_field({
dest: "nwparser.event_description",
value: constant("No translation group found"),
});
var dup111 = set_field({
dest: "nwparser.protocol",
value: constant("icmp"),
});
var dup112 = set_field({
dest: "nwparser.event_description",
value: constant("Web Cache acquired"),
});
var dup113 = set_field({
dest: "nwparser.eventcategory",
value: constant("1002020000"),
});
var dup114 = match({
id: "MESSAGE#291:302012/0",
dissect: {
tokenizer: "%{->}Pre%{p0->}",
field: "nwparser.payload",
},
});
var dup115 = linear_select([
match({
id: "MESSAGE#291:302012/2",
dissect: {
tokenizer: "-%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup116 = set_field({
dest: "nwparser.event_description",
value: constant("Connection pre-allocated"),
});
var dup117 = linear_select([
match({
id: "MESSAGE#751:610101/2",
dissect: {
tokenizer: "ed%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#751:610101/2",
dissect: {
tokenizer: "ure%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup118 = match({
id: "MESSAGE#591:405102/0",
dissect: {
tokenizer: "Unable to Pre%{p0->}",
field: "nwparser.payload",
},
});
var dup119 = linear_select([
match({
id: "MESSAGE#591:405102/4",
dissect: {
tokenizer: "oreign_address%{p3->}",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#591:405102/4",
dissect: {
tokenizer: "addr%{p3->}",
field: "nwparser.p2",
},
}),
]);
var dup120 = match({
id: "MESSAGE#591:405102/4",
dissect: {
tokenizer: "%{->} %{p4->}",
field: "nwparser.p3",
},
});
var dup121 = linear_select([
match({
id: "MESSAGE#591:405102/6",
dissect: {
tokenizer: "%{saddr->}/%{sport->} to l%{p5->}",
field: "nwparser.p4",
},
}),
match({
id: "MESSAGE#591:405102/6",
dissect: {
tokenizer: "%{saddr->} to l%{p5->}",
field: "nwparser.p4",
},
}),
]);
var dup122 = linear_select([
match({
id: "MESSAGE#591:405102/7",
dissect: {
tokenizer: "ocal_address%{p6->}",
field: "nwparser.p5",
},
}),
match({
id: "MESSAGE#591:405102/7",
dissect: {
tokenizer: "addr%{p6->}",
field: "nwparser.p5",
},
}),
]);
var dup123 = match({
id: "MESSAGE#591:405102/7",
dissect: {
tokenizer: "%{->} %{p7->}",
field: "nwparser.p6",
},
});
var dup124 = linear_select([
match({
id: "MESSAGE#591:405102/8",
dissect: {
tokenizer: "%{daddr->}/%{dport->} ",
field: "nwparser.p7",
},
}),
match({
id: "MESSAGE#591:405102/8",
dissect: {
tokenizer: "%{daddr->} ",
field: "nwparser.p7",
},
}),
]);
var dup125 = set_field({
dest: "nwparser.event_description",
value: constant("Unable to create new connection"),
});
var dup126 = set_field({
dest: "nwparser.eventcategory",
value: constant("1501000000"),
});
var dup127 = set_field({
dest: "nwparser.event_description",
value: constant("NAT configured"),
});
var dup128 = match({
id: "MESSAGE#712:602202:01/0",
dissect: {
tokenizer: "ISAKMP session connect%{p0->}",
field: "nwparser.payload",
},
});
var dup129 = linear_select([
match({
id: "MESSAGE#712:602202:01/2",
dissect: {
tokenizer: "ed%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup130 = match({
id: "MESSAGE#712:602202:01/2",
dissect: {
tokenizer: "%{->}(local %{daddr->} (responder), remote %{saddr->})",
field: "nwparser.p1",
},
});
var dup131 = set_field({
dest: "nwparser.event_description",
value: constant("ISAKMP session connected"),
});
var dup132 = match({
id: "MESSAGE#713:602202/2",
dissect: {
tokenizer: "%{->}(local %{saddr->} (initiator), remote %{daddr->})",
field: "nwparser.p1",
},
});
var dup133 = set_field({
dest: "nwparser.ec_subject",
value: constant("Message"),
});
var dup134 = set_field({
dest: "nwparser.ec_activity",
value: constant("Receive"),
});
var dup135 = linear_select([
match({
id: "MESSAGE#168:111004/2",
dissect: {
tokenizer: "Console end configuration: %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#168:111004/2",
dissect: {
tokenizer: "console end configuration: %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#168:111004/2",
dissect: {
tokenizer: "%{hostip->} end configuration: %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup136 = match({
id: "MESSAGE#168:111004/2",
dissect: {
tokenizer: "%{disposition->}",
field: "nwparser.p1",
},
});
var dup137 = set_field({
dest: "nwparser.ec_activity",
value: constant("Stop"),
});
var dup138 = match({
id: "MESSAGE#960:713903/2",
dissect: {
tokenizer: "%{saddr->} , %{action->}",
field: "nwparser.p1",
},
});
var dup139 = match({
id: "MESSAGE#961:713903:01/2",
dissect: {
tokenizer: "Username = '%{username->}' , IP = %{p1->}",
field: "nwparser.p0",
},
});
var dup140 = match({
id: "MESSAGE#961:713903:01/2",
dissect: {
tokenizer: "Username = %{username->} , IP = %{p1->}",
field: "nwparser.p0",
},
});
var dup141 = match({
id: "MESSAGE#963:713903:03/0",
dissect: {
tokenizer: "%{->} %{event_description->}",
field: "nwparser.payload",
},
});
var dup142 = set_field({
dest: "nwparser.eventcategory",
value: constant("1802000000"),
});
var dup143 = set_field({
dest: "nwparser.ec_activity",
value: constant("Logoff"),
});
var dup144 = set_field({
dest: "nwparser.result",
value: constant("Succeeded"),
});
var dup145 = constant("Failed");
var dup146 = match({
id: "MESSAGE#313:302016:05/0",
dissect: {
tokenizer: "Teardown %{protocol->} connection %{connectionid->} for %{sinterface->}:%{p0->}",
field: "nwparser.payload",
},
});
var dup147 = linear_select([
match({
id: "MESSAGE#313:302016:05/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->}(%{sdomain->}\\%{fld7->}) to %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#313:302016:05/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->} to %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup148 = call({
dest: "nwparser.duration",
fn: DUR,
args: [
constant("%N:%U:%O"),
field("duration"),
],
});
var dup149 = set_field({
dest: "nwparser.event_description",
value: constant("teardown connection"),
});
var dup150 = linear_select([
match({
id: "MESSAGE#314:302016:07/1",
dissect: {
tokenizer: "%{bytes->} (%{username->})",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#314:302016:07/1",
dissect: {
tokenizer: "%{bytes->}",
field: "nwparser.p0",
},
}),
]);
var dup151 = linear_select([
match({
id: "MESSAGE#316:302016:06/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->}(%{sdomain->}\\%{fld5->}) to %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#316:302016:06/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->} to %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup152 = match({
id: "MESSAGE#316:302016:06/2",
dissect: {
tokenizer: "%{dinterface->}:%{p2->}",
field: "nwparser.p1",
},
});
var dup153 = match({
id: "MESSAGE#316:302016:06/4",
dissect: {
tokenizer: "%{daddr->}/%{dport->}(%{ddomain->}\\%{c_username->}) duration %{p3->}",
field: "nwparser.p2",
},
});
var dup154 = match({
id: "MESSAGE#317:302016/4",
dissect: {
tokenizer: "%{daddr->}/%{dport->} duration %{p3->}",
field: "nwparser.p2",
},
});
var dup155 = match({
id: "MESSAGE#318:302016:01/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->}(%{sdomain->}\\%{fld5->}) to %{p1->}",
field: "nwparser.p0",
},
});
var dup156 = match({
id: "MESSAGE#318:302016:01/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->} to %{p1->}",
field: "nwparser.p0",
},
});
var dup157 = set_field({
dest: "nwparser.eventcategory",
value: constant("1701000000"),
});
var dup158 = match({
id: "MESSAGE#1165:722029/2",
dissect: {
tokenizer: "%{saddr->}> SVC Session Termination:%{info->}",
field: "nwparser.p1",
},
});
var dup159 = set_field({
dest: "nwparser.event_description",
value: constant("SVC Session Termination"),
});
var dup160 = set_field({
dest: "nwparser.eventcategory",
value: constant("1613030100"),
});
var dup161 = set_field({
dest: "nwparser.eventcategory",
value: constant("1702030000"),
});
var dup162 = match({
id: "MESSAGE#550:401002/0",
dissect: {
tokenizer: "%{->}Shun%{p0->}",
field: "nwparser.payload",
},
});
var dup163 = set_field({
dest: "nwparser.eventcategory",
value: constant("1701010000"),
});
var dup164 = set_field({
dest: "nwparser.ec_activity",
value: constant("Create"),
});
var dup165 = set_field({
dest: "nwparser.eventcategory",
value: constant("1603020000"),
});
var dup166 = set_field({
dest: "nwparser.eventcategory",
value: constant("1701020000"),
});
var dup167 = set_field({
dest: "nwparser.disposition",
value: constant("Failed"),
});
var dup168 = match({
id: "MESSAGE#1184:724004/2",
dissect: {
tokenizer: "%{hostip->}> Secure Desktop Results: %{info->}",
field: "nwparser.p1",
},
});
var dup169 = set_field({
dest: "nwparser.eventcategory",
value: constant("1704010000"),
});
var dup170 = set_field({
dest: "nwparser.protocol",
value: constant("UDP"),
});
var dup171 = set_field({
dest: "nwparser.eventcategory",
value: constant("1401030000"),
});
var dup172 = set_field({
dest: "nwparser.event_description",
value: constant("login session failure"),
});
var dup173 = match({
id: "MESSAGE#1024:715052/2",
dissect: {
tokenizer: "%{result->}",
field: "nwparser.p1",
},
});
var dup174 = match({
id: "MESSAGE#971:713905/2",
dissect: {
tokenizer: "%{saddr->}, %{event_description->}",
field: "nwparser.p1",
},
});
var dup175 = linear_select([
match({
id: "MESSAGE#972:713905:01/2",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#972:713905:01/2",
dissect: {
tokenizer: "IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup176 = match({
id: "MESSAGE#974:713905:03/0",
dissect: {
tokenizer: "Username = %{p0->}",
field: "nwparser.payload",
},
});
var dup177 = set_field({
dest: "nwparser.event_description",
value: constant("Embyonic connection limit exceeded"),
});
var dup178 = set_field({
dest: "nwparser.ec_outcome",
value: constant("Unknown"),
});
var dup179 = match({
id: "MESSAGE#150:109025/0",
dissect: {
tokenizer: "Authorization denied (acl=%{listnum->}) for user %{p0->}",
field: "nwparser.payload",
},
});
var dup180 = set_field({
dest: "nwparser.eventcategory",
value: constant("1803000000"),
});
var dup181 = match({
id: "MESSAGE#1172:722037/0",
dissect: {
tokenizer: "Group \u003c\u003c %{group->} > User %{p0->}",
field: "nwparser.payload",
},
});
var dup182 = linear_select([
match({
id: "MESSAGE#1172:722037/2",
dissect: {
tokenizer: "\u003c\u003c%{username->}> IP \u003c\u003c %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1172:722037/2",
dissect: {
tokenizer: "'%{username->}' IP \u003c\u003c %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1172:722037/2",
dissect: {
tokenizer: "%{username->} IP \u003c\u003c %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup183 = match({
id: "MESSAGE#475:338005/0",
dissect: {
tokenizer: "Dynamic %{p0->}",
field: "nwparser.payload",
},
});
var dup184 = linear_select([
match({
id: "MESSAGE#475:338005/2",
dissect: {
tokenizer: "F%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#475:338005/2",
dissect: {
tokenizer: "f%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup185 = set_field({
dest: "nwparser.event_description",
value: constant("translation creation failed"),
});
var dup186 = set_field({
dest: "nwparser.eventcategory",
value: constant("1608000000"),
});
var dup187 = linear_select([
match({
id: "MESSAGE#736:605004/1",
dissect: {
tokenizer: "\"%{username->}\" ",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#736:605004/1",
dissect: {
tokenizer: "'%{username->}' ",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#736:605004/1",
dissect: {
tokenizer: "%{username->} ",
field: "nwparser.p0",
},
}),
]);
var dup188 = constant("Login denied");
var dup189 = match({
id: "MESSAGE#1151:721016/0",
dissect: {
tokenizer: "(WebVPN-%{context->}) %{event_description->} user %{p0->}",
field: "nwparser.payload",
},
});
var dup190 = linear_select([
match({
id: "MESSAGE#1151:721016/2",
dissect: {
tokenizer: "'%{username->}' , IP %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1151:721016/2",
dissect: {
tokenizer: "%{username->} , IP %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup191 = set_field({
dest: "nwparser.result",
value: constant("Authorization denied"),
});
var dup192 = set_field({
dest: "nwparser.direction",
value: constant("inbound"),
});
var dup193 = set_field({
dest: "nwparser.event_description",
value: constant("build connection"),
});
var dup194 = set_field({
dest: "nwparser.direction",
value: constant("outbound"),
});
var dup195 = set_field({
dest: "nwparser.eventcategory",
value: constant("1603050000"),
});
var dup196 = set_field({
dest: "nwparser.event_description",
value: constant("connection denied"),
});
var dup197 = linear_select([
match({
id: "MESSAGE#104:106102:02/2",
dissect: {
tokenizer: "%{protocol->} for user '%{username->}' %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#104:106102:02/2",
dissect: {
tokenizer: "%{protocol->} %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup198 = match({
id: "MESSAGE#104:106102:02/2",
dissect: {
tokenizer: "%{sinterface->}/%{p2->}",
field: "nwparser.p1",
},
});
var dup199 = linear_select([
match({
id: "MESSAGE#104:106102:02/4",
dissect: {
tokenizer: "%{saddr->}(%{sport->}) -> %{p3->}",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#104:106102:02/4",
dissect: {
tokenizer: "%{saddr->} %{sport->} %{p3->}",
field: "nwparser.p2",
},
}),
]);
var dup200 = match({
id: "MESSAGE#104:106102:02/4",
dissect: {
tokenizer: "%{dinterface->}/%{p4->}",
field: "nwparser.p3",
},
});
var dup201 = linear_select([
match({
id: "MESSAGE#104:106102:02/6",
dissect: {
tokenizer: "%{daddr->}(%{dport->}) hit-cnt %{p5->}",
field: "nwparser.p4",
},
}),
match({
id: "MESSAGE#104:106102:02/6",
dissect: {
tokenizer: "%{daddr->} %{dport->} hit-cnt %{p5->}",
field: "nwparser.p4",
},
}),
]);
var dup202 = match({
id: "MESSAGE#104:106102:02/6",
dissect: {
tokenizer: "%{dclass_counter1->} %{info->}",
field: "nwparser.p5",
},
});
var dup203 = set_field({
dest: "nwparser.dclass_counter1_string",
value: constant("HitCount"),
});
var dup204 = set_field({
dest: "nwparser.eventcategory",
value: constant("1801020000"),
});
var dup205 = set_field({
dest: "nwparser.result",
value: constant("Freeing local pool address"),
});
var dup206 = set_field({
dest: "nwparser.eventcategory",
value: constant("1001030305"),
});
var dup207 = set_field({
dest: "nwparser.eventcategory",
value: constant("1606000000"),
});
var dup208 = match({
id: "MESSAGE#1037:715065/2",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
});
var dup209 = match({
id: "MESSAGE#1037:715065/2",
dissect: {
tokenizer: "Username = %{username->}, IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
});
var dup210 = match({
id: "MESSAGE#1037:715065/2",
dissect: {
tokenizer: "IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
});
var dup211 = match({
id: "MESSAGE#1216:734003:01/0",
dissect: {
tokenizer: "%{process->}: User %{p0->}",
field: "nwparser.payload",
},
});
var dup212 = linear_select([
match({
id: "MESSAGE#1216:734003:01/2",
dissect: {
tokenizer: "'%{username->}' , Addr %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1216:734003:01/2",
dissect: {
tokenizer: "%{username->} , Addr %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup213 = match({
id: "MESSAGE#474:338004/2",
dissect: {
tokenizer: "ilter %{p2->}",
field: "nwparser.p1",
},
});
var dup214 = linear_select([
match({
id: "MESSAGE#474:338004/4",
dissect: {
tokenizer: "permitt%{p3->}",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#474:338004/4",
dissect: {
tokenizer: "monitor%{p3->}",
field: "nwparser.p2",
},
}),
]);
var dup215 = linear_select([
match({
id: "MESSAGE#681:502102/2",
dissect: {
tokenizer: "'%{username->}' Priv: %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#681:502102/2",
dissect: {
tokenizer: "%{username->} Priv: %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup216 = match({
id: "MESSAGE#681:502102/2",
dissect: {
tokenizer: "%{fld1->} Encpass: %{fld2->}",
field: "nwparser.p1",
},
});
var dup217 = set_field({
dest: "nwparser.ec_theme",
value: constant("UserGroup"),
});
var dup218 = match({
id: "MESSAGE#706:602101/2",
dissect: {
tokenizer: "s%{p1->}",
field: "nwparser.p0",
},
});
var dup219 = match({
id: "MESSAGE#293:302013/0",
dissect: {
tokenizer: "Built inbound %{protocol->} connection %{connectionid->} for %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{p0->}",
field: "nwparser.payload",
},
});
var dup220 = linear_select([
match({
id: "MESSAGE#293:302013/2",
dissect: {
tokenizer: "%{stransport->})(%{domain->}\\%{fld3->})%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#293:302013/2",
dissect: {
tokenizer: "%{stransport->}) %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup221 = match({
id: "MESSAGE#294:302013:01/0",
dissect: {
tokenizer: "Built outbound %{protocol->} connection %{connectionid->} for %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->}) to %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->}) %{p0->}",
field: "nwparser.payload",
},
});
var dup222 = linear_select([
match({
id: "MESSAGE#294:302013:01/2",
dissect: {
tokenizer: "'%{username->}'%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#294:302013:01/2",
dissect: {
tokenizer: "(%{username->})%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup223 = match({
id: "MESSAGE#294:302013:01/2",
dissect: {
tokenizer: "%{->} ",
field: "nwparser.p1",
},
});
var dup224 = match({
id: "MESSAGE#295:302013:02/2",
dissect: {
tokenizer: "%{stransport->}) %{p1->}",
field: "nwparser.p0",
},
});
var dup225 = match({
id: "MESSAGE#299:302013:06/2",
dissect: {
tokenizer: "%{dtransaddr->}/%{dtransport->})(%{domain->}\\%{username->}) to %{p1->}",
field: "nwparser.p0",
},
});
var dup226 = match({
id: "MESSAGE#299:302013:06/2",
dissect: {
tokenizer: "%{dtransaddr->}/%{dtransport->}) to %{p1->}",
field: "nwparser.p0",
},
});
var dup227 = linear_select([
match({
id: "MESSAGE#299:302013:06/3",
dissect: {
tokenizer: "%{sinterface->}:%{fld2->}:%{saddr->}/%{p2->}",
field: "nwparser.p1",
},
}),
match({
id: "MESSAGE#299:302013:06/3",
dissect: {
tokenizer: "%{sinterface->}:%{saddr->}/%{p2->}",
field: "nwparser.p1",
},
}),
]);
var dup228 = match({
id: "MESSAGE#299:302013:06/3",
dissect: {
tokenizer: "%{sport->} (%{stransaddr->}/%{stransport->})",
field: "nwparser.p2",
},
});
var dup229 = set_field({
dest: "nwparser.eventcategory",
value: constant("1805010000"),
});
var dup230 = match({
id: "MESSAGE#484:338202/2",
dissect: {
tokenizer: "ilter %{p2->}",
field: "nwparser.p1",
},
});
var dup231 = set_field({
dest: "nwparser.event_description",
value: constant("IKE lost contact with remote peer deleting connection"),
});
var dup232 = set_field({
dest: "nwparser.event_description",
value: constant("IKE Initiator New/Rekeying Phase"),
});
var dup233 = set_field({
dest: "nwparser.result",
value: constant("Local pool request succeeded "),
});
var dup234 = set_field({
dest: "nwparser.event_description",
value: constant("Built translation"),
});
var dup235 = linear_select([
match({
id: "MESSAGE#726:603107/2",
dissect: {
tokenizer: ",%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup236 = match({
id: "MESSAGE#152:109027/2",
dissect: {
tokenizer: "i%{p1->}",
field: "nwparser.p0",
},
});
var dup237 = linear_select([
match({
id: "MESSAGE#152:109027/3",
dissect: {
tokenizer: "'%{username->}' ",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#152:109027/3",
dissect: {
tokenizer: "%{username->} ",
field: "nwparser.p2",
},
}),
]);
var dup238 = linear_select([
match({
id: "MESSAGE#189:113012/1",
dissect: {
tokenizer: "'%{username->}' ",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#189:113012/1",
dissect: {
tokenizer: "%{username->} ",
field: "nwparser.p0",
},
}),
]);
var dup239 = set_field({
dest: "nwparser.eventcategory",
value: constant("1001030200"),
});
var dup240 = set_field({
dest: "nwparser.event_description",
value: constant("FTP connection terminated"),
});
var dup241 = match({
id: "MESSAGE#1031:715059/2",
dissect: {
tokenizer: "%{saddr->}, %{action->}",
field: "nwparser.p1",
},
});
var dup242 = linear_select([
match({
id: "MESSAGE#855:713024/2",
dissect: {
tokenizer: "%{group->}, Username = '%{username->}', IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#855:713024/2",
dissect: {
tokenizer: "%{group->}, Username = %{username->}, IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#855:713024/2",
dissect: {
tokenizer: "%{group->}, IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup243 = match({
id: "MESSAGE#855:713024/2",
dissect: {
tokenizer: "%{action->}:%{info->}",
field: "nwparser.p1",
},
});
var dup244 = set_field({
dest: "nwparser.eventcategory",
value: constant("1613040200"),
});
var dup245 = set_field({
dest: "nwparser.event_description",
value: constant("Rekeying duration changed"),
});
var dup246 = match({
id: "MESSAGE#810:702204:01/0",
dissect: {
tokenizer: "ISAKMP Phase 1 retransmi%{p0->}",
field: "nwparser.payload",
},
});
var dup247 = linear_select([
match({
id: "MESSAGE#810:702204:01/2",
dissect: {
tokenizer: "ssion%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#810:702204:01/2",
dissect: {
tokenizer: "t%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup248 = set_field({
dest: "nwparser.event_description",
value: constant("Phase 1 retransmission"),
});
var dup249 = match({
id: "MESSAGE#1187:725002/2",
dissect: {
tokenizer: "%{->} %{interface->}:%{p2->}",
field: "nwparser.p1",
},
});
var dup250 = set_field({
dest: "nwparser.eventcategory",
value: constant("1613050100"),
});
var dup251 = linear_select([
match({
id: "MESSAGE#219:201004:01/2",
dissect: {
tokenizer: "static%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#219:201004:01/2",
dissect: {
tokenizer: "xlate%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup252 = set_field({
dest: "nwparser.event_description",
value: constant("Login session failed"),
});
var dup253 = set_field({
dest: "nwparser.event_description",
value: constant("User Authentication failed"),
});
var dup254 = linear_select([
]);
var dup255 = match({
id: "MESSAGE#1198:725010/2",
dissect: {
tokenizer: ".%{->}",
field: "nwparser.p1",
},
});
var dup256 = set_field({
dest: "nwparser.eventcategory",
value: constant("1207010200"),
});
var dup257 = set_field({
dest: "nwparser.event_description",
value: constant("icmp packet denied"),
});
var dup258 = set_field({
dest: "nwparser.result",
value: constant("to/from mangement-only network"),
});
var dup259 = set_field({
dest: "nwparser.protocol",
value: constant("ICMP"),
});
var dup260 = match({
id: "MESSAGE#651:418001:01/2",
dissect: {
tokenizer: "%{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.p1",
},
});
var dup261 = set_field({
dest: "nwparser.event_description",
value: constant("packet denied"),
});
var dup262 = match({
id: "MESSAGE#174:111010/0",
dissect: {
tokenizer: "User %{p0->}",
field: "nwparser.payload",
},
});
var dup263 = set_field({
dest: "nwparser.eventcategory",
value: constant("1401040000"),
});
var dup264 = set_field({
dest: "nwparser.eventcategory",
value: constant("1605010000"),
});
var dup265 = linear_select([
match({
id: "MESSAGE#1243:737017/2",
dissect: {
tokenizer: "Session=%{sessionid->},%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup266 = linear_select([
match({
id: "MESSAGE#625:411005/2",
dissect: {
tokenizer: "I%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#625:411005/2",
dissect: {
tokenizer: "i%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup267 = linear_select([
match({
id: "MESSAGE#1163:722027/3",
dissect: {
tokenizer: "%{saddr->} (%{fld1->}) > %{p2->}",
field: "nwparser.p1",
},
}),
match({
id: "MESSAGE#1163:722027/3",
dissect: {
tokenizer: "%{saddr->} > %{p2->}",
field: "nwparser.p1",
},
}),
]);
var dup268 = linear_select([
match({
id: "MESSAGE#1163:722027/4",
dissect: {
tokenizer: "TCP %{p3->}",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#1163:722027/4",
dissect: {
tokenizer: "UDP %{p3->}",
field: "nwparser.p2",
},
}),
]);
var dup269 = set_field({
dest: "nwparser.event_description",
value: constant("Policy installed"),
});
var dup270 = linear_select([
match({
id: "MESSAGE#1161:722023/6",
dissect: {
tokenizer: "out%{p5->}",
field: "nwparser.p4",
},
}),
]);
var dup271 = set_field({
dest: "nwparser.event_description",
value: constant("request discarded"),
});
var dup272 = set_field({
dest: "nwparser.eventcategory",
value: constant("1610000000"),
});
var dup273 = linear_select([
match({
id: "MESSAGE#1001:715021/2",
dissect: {
tokenizer: "Username = '%{username->}', IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1001:715021/2",
dissect: {
tokenizer: "Username = %{username->}, IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1001:715021/2",
dissect: {
tokenizer: "IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup274 = linear_select([
match({
id: "MESSAGE#96:106027/1",
dissect: {
tokenizer: "\"%{rule_group->}\" ",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#96:106027/1",
dissect: {
tokenizer: "%{rule_group->} ",
field: "nwparser.p0",
},
}),
]);
var dup275 = set_field({
dest: "nwparser.event_description",
value: constant("denied by access-group"),
});
var dup276 = match({
id: "MESSAGE#385:305013/2",
dissect: {
tokenizer: "%{sport->}(%{domain->}\\%{username->}) dst %{p1->}",
field: "nwparser.p0",
},
});
var dup277 = match({
id: "MESSAGE#385:305013/2",
dissect: {
tokenizer: "%{sport->} dst %{p1->}",
field: "nwparser.p0",
},
});
var dup278 = set_field({
dest: "nwparser.result",
value: constant("due to NAT reverse path failure"),
});
var dup279 = linear_select([
match({
id: "MESSAGE#552:401004/2",
dissect: {
tokenizer: "ned%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup280 = linear_select([
match({
id: "MESSAGE#989:714011/2",
dissect: {
tokenizer: "Group = %{group->}, Username = '%{username->}', IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#989:714011/2",
dissect: {
tokenizer: "Group = %{group->}, Username = %{username->}, IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#989:714011/2",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#989:714011/2",
dissect: {
tokenizer: "IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup281 = match({
id: "MESSAGE#302:302014:03/3",
dissect: {
tokenizer: "%{->} %{result->}",
field: "nwparser.p2",
},
});
var dup282 = match({
id: "MESSAGE#303:302014:02/1",
dissect: {
tokenizer: "(%{result->}) ",
field: "nwparser.p0",
},
});
var dup283 = match({
id: "MESSAGE#304:302014:04/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->}(%{domain->}\\%{fld3->}) to %{p1->}",
field: "nwparser.p0",
},
});
var dup284 = linear_select([
match({
id: "MESSAGE#304:302014:04/3",
dissect: {
tokenizer: "%{info->} (%{username->})",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#304:302014:04/3",
dissect: {
tokenizer: "%{info->}",
field: "nwparser.p2",
},
}),
]);
var dup285 = match({
id: "MESSAGE#307:302014:01/1",
dissect: {
tokenizer: "%{result->} ",
field: "nwparser.p0",
},
});
var dup286 = set_field({
dest: "nwparser.event_description",
value: constant("NAT exemption configured"),
});
var dup287 = match({
id: "MESSAGE#824:702211:01/0",
dissect: {
tokenizer: "ISAKMP Phase 2 exchange complete%{p0->}",
field: "nwparser.payload",
},
});
var dup288 = match({
id: "MESSAGE#824:702211:01/2",
dissect: {
tokenizer: "%{->} %{saddr->} (initiator), remote %{daddr->})",
field: "nwparser.p1",
},
});
var dup289 = set_field({
dest: "nwparser.event_description",
value: constant("Phase 1 exchange completed"),
});
var dup290 = match({
id: "MESSAGE#825:702211/2",
dissect: {
tokenizer: "%{->} %{daddr->} (responder), remote %{saddr->})",
field: "nwparser.p1",
},
});
var dup291 = set_field({
dest: "nwparser.event_description",
value: constant("authentication failed"),
});
var dup292 = set_field({
dest: "nwparser.eventcategory",
value: constant("1302000000"),
});
var dup293 = set_field({
dest: "nwparser.ec_subject",
value: constant("Certificate"),
});
var dup294 = set_field({
dest: "nwparser.event_description",
value: constant("connection dropped"),
});
var dup295 = set_field({
dest: "nwparser.event_description",
value: constant("teardown translation"),
});
var dup296 = linear_select([
match({
id: "MESSAGE#383:305012/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->}(%{fld51->}) to %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#383:305012/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->} to %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup297 = linear_select([
match({
id: "MESSAGE#384:305012:01/2",
dissect: {
tokenizer: "%{dinterface->}(%{fld52->}):%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#384:305012:01/2",
dissect: {
tokenizer: "%{dinterface->}:%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup298 = match({
id: "MESSAGE#629:413003/2",
dissect: {
tokenizer: ".%{p1->}",
field: "nwparser.p0",
},
});
var dup299 = set_field({
dest: "nwparser.event_description",
value: constant("IPS request to drop packet"),
});
var dup300 = match({
id: "MESSAGE#860:713035/2",
dissect: {
tokenizer: "%{saddr->} , %{action->}:%{info->}",
field: "nwparser.p1",
},
});
var dup301 = constant("Routing failed to locate next-hop");
var dup302 = set_field({
dest: "nwparser.disposition",
value: constant("failed"),
});
var dup303 = match({
id: "MESSAGE#1016:715046:01/1",
dissect: {
tokenizer: "Group = %{group->}, Username = %{username->}, IP = %{saddr->}, %{p0->}",
field: "nwparser.payload",
},
});
var dup304 = match({
id: "MESSAGE#1016:715046:01/1",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.p0",
},
});
var dup305 = linear_select([
match({
id: "MESSAGE#1021:715049:01/1",
dissect: {
tokenizer: "Group = %{group->}, Username = %{username->}, IP = %{saddr->}, %{p0->}",
field: "nwparser.payload",
},
}),
match({
id: "MESSAGE#1021:715049:01/1",
dissect: {
tokenizer: "Username = %{username->}, IP = %{saddr->}, %{p0->}",
field: "nwparser.payload",
},
}),
]);
var dup306 = set_field({
dest: "nwparser.event_description",
value: constant("Teardown connection"),
});
var dup307 = match({
id: "MESSAGE#340:302026/0",
dissect: {
tokenizer: "Built %{p0->}",
field: "nwparser.payload",
},
});
var dup308 = match({
id: "MESSAGE#340:302026/2",
dissect: {
tokenizer: "backup%{p1->}",
field: "nwparser.p0",
},
});
var dup309 = match({
id: "MESSAGE#340:302026/2",
dissect: {
tokenizer: "director%{p1->}",
field: "nwparser.p0",
},
});
var dup310 = match({
id: "MESSAGE#340:302026/2",
dissect: {
tokenizer: "%{->}stub %{protocol->} connection %{connectionid->} for %{sinterface->}:%{saddr->}/%{sport->} (%{fld1->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{fld2->})",
field: "nwparser.p1",
},
});
var dup311 = set_field({
dest: "nwparser.event_description",
value: constant("Built connection"),
});
var dup312 = match({
id: "MESSAGE#559:402116/0",
dissect: {
tokenizer: "IPSEC: Received an ESP packet (SPI= %{dst_spi->}, sequence number= %{fld2->}) from %{saddr->} %{p0->}",
field: "nwparser.payload",
},
});
var dup313 = linear_select([
match({
id: "MESSAGE#559:402116/2",
dissect: {
tokenizer: "(user=%{username->}) to %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#559:402116/2",
dissect: {
tokenizer: "(%{username->}) to %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#559:402116/2",
dissect: {
tokenizer: "'%{username->}' to %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#559:402116/2",
dissect: {
tokenizer: "%{username->} to %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup314 = match({
id: "MESSAGE#381:305011:01/2",
dissect: {
tokenizer: "%{daddr->}/%{dport->}",
field: "nwparser.p1",
},
});
var dup315 = linear_select([
match({
id: "MESSAGE#684:502112/2",
dissect: {
tokenizer: "'%{username->}' Type:%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#684:502112/2",
dissect: {
tokenizer: "%{username->} Type:%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup316 = match({
id: "MESSAGE#684:502112/2",
dissect: {
tokenizer: "%{fld1->}",
field: "nwparser.p1",
},
});
var dup317 = set_field({
dest: "nwparser.result",
value: constant("User authentication succeeded"),
});
var dup318 = set_field({
dest: "nwparser.event_description",
value: constant("SSL server requesting certificate for authentication"),
});
var dup319 = call({
dest: "nwparser.bytes",
fn: CALC,
args: [
field("sbytes"),
constant("+"),
field("rbytes"),
],
});
var dup320 = set_field({
dest: "nwparser.ec_theme",
value: constant("TEV"),
});
var dup321 = match({
id: "MESSAGE#419:315011/0",
dissect: {
tokenizer: "SSH session from %{saddr->} on interface %{interface->} for user %{p0->}",
field: "nwparser.payload",
},
});
var dup322 = match({
id: "MESSAGE#622:411002/2",
dissect: {
tokenizer: "nterface %{interface->} %{p2->}",
field: "nwparser.p1",
},
});
var dup323 = linear_select([
match({
id: "MESSAGE#622:411002/3",
dissect: {
tokenizer: ", %{result->} ",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#622:411002/3",
dissect: {
tokenizer: "%{result->} ",
field: "nwparser.p2",
},
}),
]);
var dup324 = set_field({
dest: "nwparser.eventcategory",
value: constant("1603030000"),
});
var dup325 = set_field({
dest: "nwparser.event_description",
value: constant("Denied IPv6-ICMP"),
});
var dup326 = set_field({
dest: "nwparser.eventcategory",
value: constant("1604010000"),
});
var dup327 = set_field({
dest: "nwparser.ec_activity",
value: constant("Read"),
});
var dup328 = set_field({
dest: "nwparser.event_description",
value: constant("Device chooses cipher for the SSL session"),
});
var dup329 = match({
id: "MESSAGE#870:713218/2",
dissect: {
tokenizer: "%{saddr->}, Tunnel Rejected: %{action->}",
field: "nwparser.p1",
},
});
var dup330 = set_field({
dest: "nwparser.result",
value: constant("Tunnel Rejected"),
});
var dup331 = set_field({
dest: "nwparser.eventcategory",
value: constant("1901000000"),
});
var dup332 = set_field({
dest: "nwparser.id",
value: field("p_msgid"),
});
var dup333 = set_field({
dest: "nwparser.msg_id",
value: field("p_msgid"),
});
var dup334 = set_field({
dest: "nwparser.vid",
value: field("p_msgid"),
});
var dup335 = set_field({
dest: "nwparser.event_description",
value: constant("IKEGetUserAttributes"),
});
var dup336 = set_field({
dest: "nwparser.event_description",
value: constant("Invalid destination"),
});
var dup337 = set_field({
dest: "nwparser.result",
value: constant("all servers failed"),
});
var dup338 = set_field({
dest: "nwparser.eventcategory",
value: constant("1607000000"),
});
var dup339 = match({
id: "MESSAGE#975:713906:01/0",
dissect: {
tokenizer: "Group = %{group->}, Username = %{username->}, IP = %{saddr->}, %{p0->}",
field: "nwparser.payload",
},
});
var dup340 = match({
id: "MESSAGE#975:713906:01/1",
dissect: {
tokenizer: "%{event_description->} Proxy Id:%{fld1->} Remote host: %{hostname->} Protocol %{protocol->} Port %{port->} Local subnet: %{fld2->} mask %{mask->} Protocol %{fld3->} Port %{fld4->} ",
field: "nwparser.p0",
},
});
var dup341 = match({
id: "MESSAGE#976:713906:03/0",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{p0->}",
field: "nwparser.payload",
},
});
var dup342 = match({
id: "MESSAGE#977:713906/0",
dissect: {
tokenizer: "IP = %{saddr->},%{p0->}",
field: "nwparser.payload",
},
});
var dup343 = linear_select([
match({
id: "MESSAGE#191:113014/2",
dissect: {
tokenizer: "entic%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#191:113014/2",
dissect: {
tokenizer: "oriz%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup344 = match({
id: "MESSAGE#797:620001:01/2",
dissect: {
tokenizer: "C%{p1->}",
field: "nwparser.p0",
},
});
var dup345 = linear_select([
match({
id: "MESSAGE#797:620001:01/4",
dissect: {
tokenizer: "%{saddr->}/%{sport->} to %{p3->}",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#797:620001:01/4",
dissect: {
tokenizer: "%{saddr->} to %{p3->}",
field: "nwparser.p2",
},
}),
]);
var dup346 = match({
id: "MESSAGE#797:620001:01/4",
dissect: {
tokenizer: "%{dinterface->}: %{p4->}",
field: "nwparser.p3",
},
});
var dup347 = set_field({
dest: "nwparser.event_description",
value: constant("Pre-allocate connection"),
});
var dup348 = match({
id: "MESSAGE#325:302020/3",
dissect: {
tokenizer: "%{hostip->} laddr %{p2->}",
field: "nwparser.p1",
},
});
var dup349 = match({
id: "MESSAGE#326:302020:04/1",
dissect: {
tokenizer: "%{sport->} type %{icmptype->} code %{icmpcode->}",
field: "nwparser.p0",
},
});
var dup350 = match({
id: "MESSAGE#326:302020:04/1",
dissect: {
tokenizer: "%{sport->}",
field: "nwparser.p0",
},
});
var dup351 = set_field({
dest: "nwparser.eventcategory",
value: constant("1611000000"),
});
var dup352 = match({
id: "MESSAGE#1153:722001/0",
dissect: {
tokenizer: "IP %{p0->}",
field: "nwparser.payload",
},
});
var dup353 = linear_select([
match({
id: "MESSAGE#1153:722001/2",
dissect: {
tokenizer: "%{saddr->} (%{fld1->}) %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1153:722001/2",
dissect: {
tokenizer: "%{saddr->} %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup354 = match({
id: "MESSAGE#1153:722001/2",
dissect: {
tokenizer: "%{event_description->}.",
field: "nwparser.p1",
},
});
var dup355 = set_field({
dest: "nwparser.eventcategory",
value: constant("1601010000"),
});
var dup356 = set_field({
dest: "nwparser.result",
value: constant("hardware accelerator error"),
});
var dup357 = match({
id: "MESSAGE#59:106002/0",
dissect: {
tokenizer: "%{protocol->} %{p0->}",
field: "nwparser.payload",
},
});
var dup358 = linear_select([
match({
id: "MESSAGE#59:106002/2",
dissect: {
tokenizer: "C%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#59:106002/2",
dissect: {
tokenizer: "c%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup359 = set_field({
dest: "nwparser.eventcategory",
value: constant("1803020000"),
});
var dup360 = match({
id: "MESSAGE#814:702206:01/0",
dissect: {
tokenizer: "ISAKMP malform%{p0->}",
field: "nwparser.payload",
},
});
var dup361 = set_field({
dest: "nwparser.event_description",
value: constant("malformed payload received"),
});
var dup362 = set_field({
dest: "nwparser.event_description",
value: constant("User executed command"),
});
var dup363 = set_field({
dest: "nwparser.event_description",
value: constant("Testing Interface"),
});
var dup364 = set_field({
dest: "nwparser.protocol",
value: constant("TCP"),
});
var dup365 = linear_select([
match({
id: "MESSAGE#867:713050/2",
dissect: {
tokenizer: "%{group->}, Username = '%{username->}' , IP = %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#867:713050/2",
dissect: {
tokenizer: "%{group->}, Username = %{username->} , IP = %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#867:713050/2",
dissect: {
tokenizer: "%{group->} , IP = %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup366 = match({
id: "MESSAGE#346:303002:02/2",
dissect: {
tokenizer: "'%{username->}' %{p1->}",
field: "nwparser.p0",
},
});
var dup367 = match({
id: "MESSAGE#346:303002:02/2",
dissect: {
tokenizer: "%{username->} %{p1->}",
field: "nwparser.p0",
},
});
var dup368 = match({
id: "MESSAGE#489:338303/2",
dissect: {
tokenizer: ",%{p1->}",
field: "nwparser.p0",
},
});
var dup369 = linear_select([
match({
id: "MESSAGE#331:302021/2",
dissect: {
tokenizer: "%{hostip->}/%{fld4->} laddr %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#331:302021/2",
dissect: {
tokenizer: "%{hostip->} laddr %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup370 = linear_select([
match({
id: "MESSAGE#331:302021/2",
dissect: {
tokenizer: "%{daddr->}/%{dport->}(%{username->})",
field: "nwparser.p1",
},
}),
match({
id: "MESSAGE#331:302021/2",
dissect: {
tokenizer: "%{daddr->}/%{dport->} %{username->}",
field: "nwparser.p1",
},
}),
match({
id: "MESSAGE#331:302021/2",
dissect: {
tokenizer: "%{daddr->}/%{dport->}",
field: "nwparser.p1",
},
}),
]);
var dup371 = set_field({
dest: "nwparser.event_description",
value: constant("denied by access-list"),
});
var dup372 = set_field({
dest: "nwparser.event_description",
value: constant("Session terminated"),
});
var dup373 = linear_select([
match({
id: "MESSAGE#133:109012/2",
dissect: {
tokenizer: "'%{username->}' , sid %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#133:109012/2",
dissect: {
tokenizer: "%{username->} , sid %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup374 = match({
id: "MESSAGE#822:702210:01/0",
dissect: {
tokenizer: "ISAKMP Phase 1 exchange complete%{p0->}",
field: "nwparser.payload",
},
});
var dup375 = set_field({
dest: "nwparser.eventcategory",
value: constant("1701070000"),
});
var dup376 = set_field({
dest: "nwparser.ec_activity",
value: constant("Disable"),
});
var dup377 = match({
id: "MESSAGE#617:410001/0",
dissect: {
tokenizer: "Dropped UDP DNS re%{p0->}",
field: "nwparser.payload",
},
});
var dup378 = linear_select([
match({
id: "MESSAGE#617:410001/2",
dissect: {
tokenizer: "ply%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#617:410001/2",
dissect: {
tokenizer: "quest%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup379 = match({
id: "MESSAGE#617:410001/4",
dissect: {
tokenizer: "packet%{p3->}",
field: "nwparser.p2",
},
});
var dup380 = match({
id: "MESSAGE#617:410001/4",
dissect: {
tokenizer: "label%{p3->}",
field: "nwparser.p2",
},
});
var dup381 = match({
id: "MESSAGE#617:410001/6",
dissect: {
tokenizer: "%{->}limit of %{fld2->} bytes",
field: "nwparser.p5",
},
});
var dup382 = set_field({
dest: "nwparser.event_description",
value: constant("Dropped DNS UDP packet - length exceeded"),
});
var dup383 = match({
id: "MESSAGE#185:113009/0",
dissect: {
tokenizer: "AAA retrieved default group policy %{p0->}",
field: "nwparser.payload",
},
});
var dup384 = linear_select([
match({
id: "MESSAGE#185:113009/4",
dissect: {
tokenizer: "'%{username->}' ",
field: "nwparser.p3",
},
}),
match({
id: "MESSAGE#185:113009/4",
dissect: {
tokenizer: "%{username->} ",
field: "nwparser.p3",
},
}),
]);
var dup385 = set_field({
dest: "nwparser.result",
value: constant("retrieved default group policy"),
});
var dup386 = match({
id: "MESSAGE#878:713075/3",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.p2",
},
});
var dup387 = linear_select([
match({
id: "MESSAGE#1008:715036:01/1",
dissect: {
tokenizer: "%{event_description->} (seq number %{fld1->}) ",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1008:715036:01/1",
dissect: {
tokenizer: "%{->} %{event_description->}",
field: "nwparser.p0",
},
}),
]);
var dup388 = match({
id: "MESSAGE#957:713902/2",
dissect: {
tokenizer: "Group = %{group->}, Username = '%{username->}', IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
});
var dup389 = match({
id: "MESSAGE#957:713902/2",
dissect: {
tokenizer: "Group = %{group->}, Username = %{username->}, IP = %{saddr->} , %{p1->}",
field: "nwparser.p0",
},
});
var dup390 = linear_select([
match({
id: "MESSAGE#958:713902:02/2",
dissect: {
tokenizer: "Group = %{group->}, IP = %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#958:713902:02/2",
dissect: {
tokenizer: "Username = '%{username->}' , IP = %{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#958:713902:02/2",
dissect: {
tokenizer: "Username = %{username->} , IP = %{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup391 = set_field({
dest: "nwparser.event_description",
value: constant("Embryonic limit exceeded"),
});
var dup392 = set_field({
dest: "nwparser.result",
value: constant("for through connections"),
});
var dup393 = set_field({
dest: "nwparser.event_description",
value: constant("duplicate packet detected"),
});
var dup394 = set_field({
dest: "nwparser.result",
value: constant("DHCP configured"),
});
var dup395 = set_field({
dest: "nwparser.event_description",
value: constant("Received an ICMP Destination Unreachable"),
});
var dup396 = set_field({
dest: "nwparser.dclass_counter1_string",
value: constant("Hitcount"),
});
var dup397 = match({
id: "MESSAGE#100:106100:01/0",
dissect: {
tokenizer: "access-list %{listnum->} %{p0->}",
field: "nwparser.payload",
},
});
var dup398 = linear_select([
match({
id: "MESSAGE#100:106100:01/2",
dissect: {
tokenizer: "est-allow%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#100:106100:01/2",
dissect: {
tokenizer: "permitt%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup399 = match({
id: "MESSAGE#100:106100:01/4",
dissect: {
tokenizer: "%{dport->})(%{fld7->}) hit-cnt %{p3->}",
field: "nwparser.p2",
},
});
var dup400 = match({
id: "MESSAGE#100:106100:01/4",
dissect: {
tokenizer: "%{dport->}) hit-cnt %{p3->}",
field: "nwparser.p2",
},
});
var dup401 = match({
id: "MESSAGE#100:106100:01/4",
dissect: {
tokenizer: "%{dclass_counter1->} %{fld6->}",
field: "nwparser.p3",
},
});
var dup402 = set_field({
dest: "nwparser.event_description",
value: constant("permitted"),
});
var dup403 = linear_select([
match({
id: "MESSAGE#101:106100:02/4",
dissect: {
tokenizer: "%{dport->})(%{domain->}\\%{username->}) hit-cnt %{p3->}",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#101:106100:02/4",
dissect: {
tokenizer: "%{dport->})(%{fld7->}) hit-cnt %{p3->}",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#101:106100:02/4",
dissect: {
tokenizer: "%{dport->}) hit-cnt %{p3->}",
field: "nwparser.p2",
},
}),
]);
var dup404 = match({
id: "MESSAGE#818:702208:01/0",
dissect: {
tokenizer: "ISAKMP Phase 1 exchange start%{p0->}",
field: "nwparser.payload",
},
});
var dup405 = set_field({
dest: "nwparser.event_description",
value: constant("Phase 1 exchange started"),
});
var dup406 = set_field({
dest: "nwparser.eventcategory",
value: constant("1204000000"),
});
var dup407 = match({
id: "MESSAGE#735:605003/3",
dissect: {
tokenizer: "'%{username->}' ",
field: "nwparser.p2",
},
});
var dup408 = match({
id: "MESSAGE#735:605003/3",
dissect: {
tokenizer: "%{username->} ",
field: "nwparser.p2",
},
});
var dup409 = set_field({
dest: "nwparser.event_description",
value: constant("invalid IPSEC packet"),
});
var dup410 = set_field({
dest: "nwparser.eventcategory",
value: constant("1601020000"),
});
var dup411 = match({
id: "MESSAGE#156:109033:01/0",
dissect: {
tokenizer: "Authentication failed for admin user %{p0->}",
field: "nwparser.payload",
},
});
var dup412 = set_field({
dest: "nwparser.event_description",
value: constant("Authentication Failed"),
});
var dup413 = set_field({
dest: "nwparser.result",
value: constant("Interactive challenge processing not supported"),
});
var dup414 = match({
id: "MESSAGE#181:113005:01/0",
dissect: {
tokenizer: "AAA user auth%{p0->}",
field: "nwparser.payload",
},
});
var dup415 = match({
id: "MESSAGE#181:113005:01/2",
dissect: {
tokenizer: "ation Rejected : reason = %{result->} : server = %{p2->}",
field: "nwparser.p1",
},
});
var dup416 = linear_select([
match({
id: "MESSAGE#181:113005:01/4",
dissect: {
tokenizer: "%{hostip->} :%{p3->}",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#181:113005:01/4",
dissect: {
tokenizer: "%{hostip->},%{p3->}",
field: "nwparser.p2",
},
}),
]);
var dup417 = linear_select([
match({
id: "MESSAGE#181:113005:01/6",
dissect: {
tokenizer: "U%{p5->}",
field: "nwparser.p4",
},
}),
match({
id: "MESSAGE#181:113005:01/6",
dissect: {
tokenizer: "u%{p5->}",
field: "nwparser.p4",
},
}),
]);
var dup418 = match({
id: "MESSAGE#181:113005:01/6",
dissect: {
tokenizer: "ser = %{p6->}",
field: "nwparser.p5",
},
});
var dup419 = set_field({
dest: "nwparser.event_description",
value: constant("user authentication rejected"),
});
var dup420 = set_field({
dest: "nwparser.eventcategory",
value: constant("1602000000"),
});
var dup421 = set_field({
dest: "nwparser.event_description",
value: constant("Client allowed"),
});
var dup422 = match({
id: "MESSAGE#211:199009/3",
dissect: {
tokenizer: "%{result->} ",
field: "nwparser.p2",
},
});
var dup423 = set_field({
dest: "nwparser.event_description",
value: constant("Translation denied"),
});
var dup424 = set_field({
dest: "nwparser.result",
value: constant("Unable to get address from group-policy or tunnel-group"),
});
var dup425 = linear_select([
match({
id: "MESSAGE#727:603108/2",
dissect: {
tokenizer: "T%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#727:603108/2",
dissect: {
tokenizer: "t%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup426 = linear_select([
match({
id: "MESSAGE#740:606001/2",
dissect: {
tokenizer: "P%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#740:606001/2",
dissect: {
tokenizer: "AS%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup427 = match({
id: "MESSAGE#812:702205:01/0",
dissect: {
tokenizer: "ISAKMP Phase 2 retransmi%{p0->}",
field: "nwparser.payload",
},
});
var dup428 = set_field({
dest: "nwparser.event_description",
value: constant("deleting static route for address"),
});
var dup429 = linear_select([
match({
id: "MESSAGE#738:605005/1",
dissect: {
tokenizer: "\u003c\u003c%{username->}> ",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#738:605005/1",
dissect: {
tokenizer: "\"%{username->}\" ",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#738:605005/1",
dissect: {
tokenizer: "'%{username->}' ",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#738:605005/1",
dissect: {
tokenizer: "%{username->} ",
field: "nwparser.p0",
},
}),
]);
var dup430 = set_field({
dest: "nwparser.dport",
value: constant("23"),
});
var dup431 = set_field({
dest: "nwparser.sport",
value: constant("0"),
});
var dup432 = set_field({
dest: "nwparser.event_description",
value: constant("Denied login session"),
});
var dup433 = constant("Tunnel Rejected");
var dup434 = set_field({
dest: "nwparser.event_description",
value: constant("assigned to session"),
});
var dup435 = match({
id: "MESSAGE#820:702209:01/0",
dissect: {
tokenizer: "ISAKMP Phase 2 exchange start%{p0->}",
field: "nwparser.payload",
},
});
var dup436 = match({
id: "MESSAGE#714:602203:01/0",
dissect: {
tokenizer: "ISAKMP session disconnect%{p0->}",
field: "nwparser.payload",
},
});
var dup437 = set_field({
dest: "nwparser.event_description",
value: constant("ISAKMP session disconnected"),
});
var dup438 = match({
id: "MESSAGE#1176:722049/3",
dissect: {
tokenizer: "%{info->}",
field: "nwparser.p2",
},
});
var dup439 = linear_select([
match({
id: "MESSAGE#116:108004:01/2",
dissect: {
tokenizer: "quest%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#116:108004:01/2",
dissect: {
tokenizer: "sponse%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup440 = match({
id: "MESSAGE#116:108004:01/2",
dissect: {
tokenizer: "%{->}from %{sinterface->}: %{p2->}",
field: "nwparser.p1",
},
});
var dup441 = linear_select([
match({
id: "MESSAGE#116:108004:01/6",
dissect: {
tokenizer: "%{daddr->}/%{dport->} ;%{p5->}",
field: "nwparser.p4",
},
}),
match({
id: "MESSAGE#116:108004:01/6",
dissect: {
tokenizer: "%{daddr->} ;%{p5->}",
field: "nwparser.p4",
},
}),
]);
var dup442 = match({
id: "MESSAGE#116:108004:01/6",
dissect: {
tokenizer: "%{info->}",
field: "nwparser.p5",
},
});
var dup443 = linear_select([
match({
id: "MESSAGE#338:302024/2",
dissect: {
tokenizer: "backup%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#338:302024/2",
dissect: {
tokenizer: "director%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#338:302024/2",
dissect: {
tokenizer: "forwarder%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup444 = set_field({
dest: "nwparser.event_description",
value: constant("SVC connection established"),
});
var dup445 = match({
id: "MESSAGE#826:702212:01/0",
dissect: {
tokenizer: "ISAKMP Phase 1 initiat%{p0->}",
field: "nwparser.payload",
},
});
var dup446 = linear_select([
match({
id: "MESSAGE#826:702212:01/2",
dissect: {
tokenizer: "ing%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#826:702212:01/2",
dissect: {
tokenizer: "e%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup447 = set_field({
dest: "nwparser.event_description",
value: constant("Phase 1 initiating rekey"),
});
var dup448 = match({
id: "MESSAGE#866:713049/4",
dissect: {
tokenizer: "User%{p3->}",
field: "nwparser.p2",
},
});
var dup449 = set_field({
dest: "nwparser.event_description",
value: constant("Phase 1 delete sent"),
});
var dup450 = linear_select([
match({
id: "MESSAGE#288:302009:01/2",
dissect: {
tokenizer: "addr%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#288:302009:01/2",
dissect: {
tokenizer: "oreign_address%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup451 = match({
id: "MESSAGE#288:302009:01/2",
dissect: {
tokenizer: "%{->} %{saddr->}/%{sport->} g%{p2->}",
field: "nwparser.p1",
},
});
var dup452 = linear_select([
match({
id: "MESSAGE#288:302009:01/4",
dissect: {
tokenizer: "addr%{p3->}",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#288:302009:01/4",
dissect: {
tokenizer: "lobal_address%{p3->}",
field: "nwparser.p2",
},
}),
]);
var dup453 = match({
id: "MESSAGE#288:302009:01/4",
dissect: {
tokenizer: "%{->} %{hostip->}/%{network_port->} l%{p4->}",
field: "nwparser.p3",
},
});
var dup454 = linear_select([
match({
id: "MESSAGE#288:302009:01/6",
dissect: {
tokenizer: "addr%{p5->}",
field: "nwparser.p4",
},
}),
match({
id: "MESSAGE#288:302009:01/6",
dissect: {
tokenizer: "ocal_address%{p5->}",
field: "nwparser.p4",
},
}),
]);
var dup455 = match({
id: "MESSAGE#288:302009:01/6",
dissect: {
tokenizer: "%{->} %{daddr->}/%{dport->}",
field: "nwparser.p5",
},
});
var dup456 = set_field({
dest: "nwparser.event_description",
value: constant("Rebuilt connection"),
});
var dup457 = match({
id: "MESSAGE#278:302004/2",
dissect: {
tokenizer: "allocate %{network_service->} %{protocol->} backconnection for f%{p2->}",
field: "nwparser.p1",
},
});
var dup458 = linear_select([
match({
id: "MESSAGE#278:302004/4",
dissect: {
tokenizer: "addr%{p3->}",
field: "nwparser.p2",
},
}),
match({
id: "MESSAGE#278:302004/4",
dissect: {
tokenizer: "oreign_address%{p3->}",
field: "nwparser.p2",
},
}),
]);
var dup459 = set_field({
dest: "nwparser.eventcategory",
value: constant("1613050200"),
});
var dup460 = set_field({
dest: "nwparser.event_description",
value: constant("Device failed SSL handshake"),
});
var dup461 = set_field({
dest: "nwparser.event_description",
value: constant("Connection Redirected via Load Balancing"),
});
var dup462 = match({
id: "MESSAGE#808:702203:01/0",
dissect: {
tokenizer: "ISAKMP DPD time%{p0->}",
field: "nwparser.payload",
},
});
var dup463 = set_field({
dest: "nwparser.event_description",
value: constant("DPD timed out"),
});
var dup464 = set_field({
dest: "nwparser.event_description",
value: constant("Monitoring on interface"),
});
var dup465 = match({
id: "MESSAGE#1284:713171/2",
dissect: {
tokenizer: "%{group->}, Username = %{username->} , IP = %{p1->}",
field: "nwparser.p0",
},
});
var dup466 = match({
id: "MESSAGE#1284:713171/2",
dissect: {
tokenizer: "%{group->} , IP = %{p1->}",
field: "nwparser.p0",
},
});
var dup467 = set_field({
dest: "nwparser.event_description",
value: constant("Address assignment failed"),
});
var dup468 = match({
id: "MESSAGE#991:715001/1",
dissect: {
tokenizer: "%{->} %{event_description->}",
field: "nwparser.p0",
},
});
var dup469 = match({
id: "MESSAGE#1185:725001:01/0",
dissect: {
tokenizer: "Starting SSL handshake with %{p0->}",
field: "nwparser.payload",
},
});
var dup470 = linear_select([
match({
id: "MESSAGE#1185:725001:01/2",
dissect: {
tokenizer: "client%{p1->}",
field: "nwparser.p0",
},
}),
match({
id: "MESSAGE#1185:725001:01/2",
dissect: {
tokenizer: "server%{p1->}",
field: "nwparser.p0",
},
}),
]);
var dup471 = set_field({
dest: "nwparser.event_description",
value: constant("Starting SSL handshake"),
});
var dup472 = match({
id: "MESSAGE#951:713259/2",
dissect: {
tokenizer: "%{saddr->}, Session is being torn down. Reason: %{result->}",
field: "nwparser.p1",
},
});
var dup473 = set_field({
dest: "nwparser.event_description",
value: constant("Session is being torn down"),
});
var dup474 = set_field({
dest: "nwparser.context",
value: constant("Content type not found"),
});
var dup475 = match({
id: "MESSAGE#886:713120/2",
dissect: {
tokenizer: "%{group->}, Username = '%{username->}' , IP = %{p1->}",
field: "nwparser.p0",
},
});
var dup476 = constant("INSIDE");
var dup477 = constant("OUTSIDE");
var hdr1 = match({
id: "HEADER#0:0001",
dissect: {
tokenizer: "%ASA-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr2 = match({
id: "HEADER#1:0033",
dissect: {
tokenizer: "%{month->} %{day->} %{year->} %{hhour->}:%{hmin->}:%{hsec->} %{hostip->} : %ASA-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr3 = match({
id: "HEADER#2:0002",
dissect: {
tokenizer: "%{month->} %{day->} %{year->} %{hhour->}:%{hmin->}:%{hsec->} %{hhost->}: %ASA-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr4 = match({
id: "HEADER#3:0003/0",
dissect: {
tokenizer: "%{month->} %{day->} %{year->} %{p0->}",
field: "message",
},
});
var msg1 = match({
id: "HEADER#3:0003/2",
dissect: {
tokenizer: "%{hhour->}:%{hmin->}:%{hsec->}: %ASA-%{p1->}",
field: "nwparser.p0",
},
});
var msg2 = match({
id: "HEADER#3:0003/2",
dissect: {
tokenizer: "%{hhour->}:%{hmin->}:%{hsec->} %ASA-%{p1->}",
field: "nwparser.p0",
},
});
var select1 = linear_select([
msg1,
msg2,
]);
var msg3 = match({
id: "HEADER#3:0003/2",
dissect: {
tokenizer: "%{level->}-%{messageid->}: %{payload->}",
field: "nwparser.p1",
},
});
var all1 = all_match({
processors: [
hdr4,
select1,
msg3,
],
});
var hdr5 = match({
id: "HEADER#4:0012",
dissect: {
tokenizer: "%{month->} %{day->} %{hhour->}:%{hmin->}:%{hsec->} %{hostip->} %ASA-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr6 = match({
id: "HEADER#5:0004",
dissect: {
tokenizer: "%{paddr->} %ASA-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr7 = match({
id: "HEADER#6:0010",
dissect: {
tokenizer: ":%{month->} %{day->} %{hhour->}:%{hmin->}:%{hsec->} %{timezone->}: %ASA-%{hfld1->}-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr8 = match({
id: "HEADER#7:0014",
dissect: {
tokenizer: "%{month->} %{day->} %{hhour->}:%{hmin->}:%{hsec->} %{timezone->}: %ASA-%{hfld1->}-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr9 = match({
id: "HEADER#8:0011",
dissect: {
tokenizer: "%ASA-%{hfld1->}-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr10 = match({
id: "HEADER#9:0005",
dissect: {
tokenizer: "%ASA-%{level->}-%{messageid->} %{payload->}",
field: "message",
},
});
var hdr11 = match({
id: "HEADER#10:0006",
dissect: {
tokenizer: "%FWSM-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr12 = match({
id: "HEADER#11:0007",
dissect: {
tokenizer: "%{month->} %{day->} %{year->} %{hhour->}:%{hmin->}:%{hsec->} %{paddr->} : %FWSM-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr13 = match({
id: "HEADER#12:0008",
dissect: {
tokenizer: "%{month->} %{day->} %{year->} %{hhour->}:%{hmin->}:%{hsec->} %FWSM-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr14 = match({
id: "HEADER#13:0009",
dissect: {
tokenizer: "%{paddr->} %FWSM-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr15 = match({
id: "HEADER#14:0013",
dissect: {
tokenizer: ":%ASA-%{group->}-%{level->}-%{messageid->}: %{payload->}",
field: "message",
},
});
var hdr16 = match({
id: "HEADER#15:9999",
dissect: {
tokenizer: "%ASA-%{payload->}",
field: "message",
},
on_success: processor_chain([
dup0,
]),
});
var hdr17 = match({
id: "HEADER#16:9998",
dissect: {
tokenizer: "%{fld->}%ASA-%{payload->}",
field: "message",
},
on_success: processor_chain([
dup0,
]),
});
var select2 = linear_select([
hdr1,
hdr2,
hdr3,
all1,
hdr5,
hdr6,
hdr7,
hdr8,
hdr9,
hdr10,
hdr11,
hdr12,
hdr13,
hdr14,
hdr15,
hdr16,
hdr17,
]);
var msg4 = match({
id: "MESSAGE#17:103005",
dissect: {
tokenizer: "(%{context->})%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup1,
set_field({
dest: "nwparser.msg_id1",
value: constant("103005"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg5 = match({
id: "MESSAGE#936:713222",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, Static Crypto Map check, map = %{fld1->}, seq = %{fld2->}, %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup6,
set_field({
dest: "nwparser.msg_id1",
value: constant("713222"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
dup8,
]),
});
var msg6 = match({
id: "MESSAGE#1042:715077/2",
dissect: {
tokenizer: "%{group->}, Username = '%{username->}', IP = %{saddr->}, Pitcher: %{p1->}",
field: "nwparser.p0",
},
});
var msg7 = match({
id: "MESSAGE#1042:715077/2",
dissect: {
tokenizer: "%{group->}, Username = %{username->}, IP = %{saddr->}, Pitcher: %{p1->}",
field: "nwparser.p0",
},
});
var msg8 = match({
id: "MESSAGE#1042:715077/2",
dissect: {
tokenizer: "%{group->}, IP = %{saddr->}, Pitcher: %{p1->}",
field: "nwparser.p0",
},
});
var select3 = linear_select([
msg6,
msg7,
msg8,
]);
var msg9 = match({
id: "MESSAGE#1042:715077/2",
dissect: {
tokenizer: "%{action->}, spi %{dst_spi->}",
field: "nwparser.p1",
},
});
var all2 = all_match({
processors: [
dup9,
select3,
msg9,
],
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("715077"),
}),
dup7,
dup11,
dup12,
dup13,
dup4,
dup5,
dup2,
dup3,
]),
});
var msg10 = match({
id: "MESSAGE#1043:715077:01/0",
dissect: {
tokenizer: "Pitcher: %{result->} %{p0->}",
field: "nwparser.payload",
},
});
var msg11 = match({
id: "MESSAGE#1043:715077:01/2",
dissect: {
tokenizer: ", %{p1->}",
field: "nwparser.p0",
},
});
var select4 = linear_select([
msg11,
]);
var msg12 = match({
id: "MESSAGE#1043:715077:01/2",
dissect: {
tokenizer: "spi %{dst_spi->}",
field: "nwparser.p1",
},
});
var all3 = all_match({
processors: [
msg10,
select4,
msg12,
],
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("715077:01"),
}),
dup7,
dup11,
dup12,
dup13,
dup14,
dup4,
dup5,
dup2,
dup3,
]),
});
var select5 = linear_select([
all2,
all3,
]);
var msg13 = match({
id: "MESSAGE#192:113015/0",
dissect: {
tokenizer: "%{action->} : reason = %{result->} : local database : user = %{p0->}",
field: "nwparser.payload",
},
});
var msg14 = match({
id: "MESSAGE#192:113015/1",
dissect: {
tokenizer: "%{username->} : user IP = %{saddr->}",
field: "nwparser.p0",
},
});
var select6 = linear_select([
msg14,
dup15,
]);
var all4 = all_match({
processors: [
msg13,
select6,
],
on_success: processor_chain([
dup16,
set_field({
dest: "nwparser.msg_id1",
value: constant("113015"),
}),
dup17,
dup18,
dup19,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg15 = match({
id: "MESSAGE#241:210001",
dissect: {
tokenizer: "LU SMNAME error = %{resultcode->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("210001"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg16 = match({
id: "MESSAGE#360:304008/0",
dissect: {
tokenizer: "%{->}L%{p0->}",
field: "nwparser.payload",
},
});
var msg17 = match({
id: "MESSAGE#360:304008/2",
dissect: {
tokenizer: "EAVING%{p1->}",
field: "nwparser.p0",
},
});
var msg18 = match({
id: "MESSAGE#360:304008/2",
dissect: {
tokenizer: "eaving%{p1->}",
field: "nwparser.p0",
},
});
var select7 = linear_select([
msg17,
msg18,
]);
var msg19 = match({
id: "MESSAGE#360:304008/2",
dissect: {
tokenizer: "%{->}ALLOW mode, URL Server",
field: "nwparser.p1",
},
});
var all5 = all_match({
processors: [
msg16,
select7,
msg19,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("304008"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg20 = match({
id: "MESSAGE#362:305001",
dissect: {
tokenizer: "Portmapped translation built for gaddr %{hostip->}/%{network_port->} laddr %{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305001"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Portmapped translation built"),
}),
]),
});
var msg21 = match({
id: "MESSAGE#1278:752004",
dissect: {
tokenizer: "Tunnel Manager dispatching a %{fld3->} message to IKEv1. Map Tag = %{fld1->}. Map Sequence Number = %{fld2->}.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("752004"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg22 = match({
id: "MESSAGE#872:713066/2",
dissect: {
tokenizer: "%{saddr->}, IKE Remote Peer configured for crypto map: %{fld1->}",
field: "nwparser.p1",
},
});
var all6 = all_match({
processors: [
dup22,
dup23,
msg22,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("713066"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg23 = match({
id: "MESSAGE#873:713066:01",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, IKE Remote Peer configured for crypto map: %{fld1->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("713066:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var select8 = linear_select([
all6,
msg23,
]);
var msg24 = match({
id: "MESSAGE#1294:769004",
dissect: {
tokenizer: "UPDATE: ASA image checksum error copying '%{filename->}' to '%{fld22->}'",
field: "nwparser.payload",
},
on_success: processor_chain([
dup24,
set_field({
dest: "nwparser.msg_id1",
value: constant("769004"),
}),
dup14,
dup2,
dup25,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("image checksum error"),
}),
]),
});
var msg25 = match({
id: "MESSAGE#498:400001",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup26,
set_field({
dest: "nwparser.msg_id1",
value: constant("400001"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var all7 = all_match({
processors: [
dup31,
dup32,
dup33,
],
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("602304"),
}),
dup7,
dup2,
dup35,
dup4,
dup5,
]),
});
var msg26 = match({
id: "MESSAGE#743:606004",
dissect: {
tokenizer: "ASDM logging session number %{sessionid->} from %{hostip->} ended",
field: "nwparser.payload",
},
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("606004"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg27 = match({
id: "MESSAGE#839:709006",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup37,
set_field({
dest: "nwparser.msg_id1",
value: constant("709006"),
}),
dup38,
dup39,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg28 = match({
id: "MESSAGE#792:617001",
dissect: {
tokenizer: "GTPv version %{fld1->} from %{sinterface->}:%{saddr->}/%{sport->} not accepted by %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup41,
set_field({
dest: "nwparser.msg_id1",
value: constant("617001"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
set_field({
dest: "nwparser.result",
value: constant("GTP version not accepted"),
}),
dup4,
dup5,
]),
});
var msg29 = match({
id: "MESSAGE#921:713194/2",
dissect: {
tokenizer: "Group = %{group->}, Username = '%{username->}', IP = %{saddr->}, %{p1->}",
field: "nwparser.p0",
},
});
var msg30 = match({
id: "MESSAGE#921:713194/2",
dissect: {
tokenizer: "Group = %{group->}, Username = %{username->}, IP = %{saddr->}, %{p1->}",
field: "nwparser.p0",
},
});
var select9 = linear_select([
msg29,
msg30,
dup45,
dup46,
]);
var all8 = all_match({
processors: [
dup44,
select9,
dup33,
],
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("713194"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var all9 = all_match({
processors: [
dup44,
dup47,
dup48,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("715048"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg31 = match({
id: "MESSAGE#3:101004",
dissect: {
tokenizer: "(%{context->})%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup49,
set_field({
dest: "nwparser.msg_id1",
value: constant("101004"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg32 = match({
id: "MESSAGE#225:201009",
dissect: {
tokenizer: "TCP connection limit of %{dclass_counter1->} for host %{hostip->} on %{interface->} exceeded",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("201009"),
}),
dup2,
dup3,
set_field({
dest: "nwparser.dclass_counter1_string",
value: constant("Number of connections"),
}),
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("TCP connection limit exceeded"),
}),
]),
});
var msg33 = match({
id: "MESSAGE#610:409008",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup50,
set_field({
dest: "nwparser.msg_id1",
value: constant("409008"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg34 = match({
id: "MESSAGE#779:611323",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("611323"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg35 = match({
id: "MESSAGE#542:400045",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup52,
set_field({
dest: "nwparser.msg_id1",
value: constant("400045"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg36 = match({
id: "MESSAGE#1250:737031/2",
dissect: {
tokenizer: "Removed%{hostip->} from standby",
field: "nwparser.p1",
},
});
var all10 = all_match({
processors: [
dup53,
dup54,
msg36,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("737031"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Removed host from standby"),
}),
]),
});
var msg37 = match({
id: "MESSAGE#561:402118",
dissect: {
tokenizer: "IPSEC: Received an ESP packet (SPI= %{protocol->}, sequence number=%{fld1->}) from %{saddr->} (user=%{username->}) to %{daddr->} containing an illegal IP fragment of length %{dclass_counter1->} with offset %{dclass_counter2->}.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup55,
set_field({
dest: "nwparser.msg_id1",
value: constant("402118"),
}),
dup7,
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("illegal IP fragment on IPSEC packet"),
}),
dup56,
]),
});
var msg38 = match({
id: "MESSAGE#700:505015/1",
dissect: {
tokenizer: "%{product->} Module in slot %{fld1->}, application up \"%{p0->}",
field: "nwparser.payload",
},
});
var msg39 = match({
id: "MESSAGE#700:505015/1",
dissect: {
tokenizer: "Module ips, application up \"%{p0->}",
field: "nwparser.payload",
},
});
var select10 = linear_select([
msg38,
msg39,
]);
var all11 = all_match({
processors: [
select10,
dup57,
],
on_success: processor_chain([
dup58,
set_field({
dest: "nwparser.msg_id1",
value: constant("505015"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg40 = match({
id: "MESSAGE#774:611318",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup59,
set_field({
dest: "nwparser.msg_id1",
value: constant("611318"),
}),
dup7,
dup60,
dup38,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg41 = match({
id: "MESSAGE#1227:737001/2",
dissect: {
tokenizer: "Received message '%{info->}'",
field: "nwparser.p1",
},
});
var all12 = all_match({
processors: [
dup53,
dup54,
msg41,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("737001"),
}),
dup2,
dup3,
set_field({
dest: "nwparser.result",
value: constant("Received message"),
}),
dup4,
dup5,
]),
});
var msg42 = match({
id: "MESSAGE#729:604101",
dissect: {
tokenizer: "DHCP client interface %{interface->}:%{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup58,
set_field({
dest: "nwparser.msg_id1",
value: constant("604101"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg43 = match({
id: "MESSAGE#128:109007/0",
dissect: {
tokenizer: "Authorization permitted for user %{p0->}",
field: "nwparser.payload",
},
});
var all13 = all_match({
processors: [
msg43,
dup61,
dup62,
],
on_success: processor_chain([
dup63,
set_field({
dest: "nwparser.msg_id1",
value: constant("109007"),
}),
dup17,
dup64,
dup65,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("Successful Authorization"),
}),
]),
});
var msg44 = match({
id: "MESSAGE#160:110002",
dissect: {
tokenizer: "No ARP for host %{hostip->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("110002"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("No ARP for host"),
}),
]),
});
var msg45 = match({
id: "MESSAGE#161:110002:01",
dissect: {
tokenizer: "Failed to locate egress interface for %{protocol->} from %{sinterface->}:%{saddr->}/%{sport->} to %{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("110002:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Failed to locate egress interface"),
}),
]),
});
var select11 = linear_select([
msg44,
msg45,
]);
var msg46 = match({
id: "MESSAGE#351:304001/2",
dissect: {
tokenizer: "%{saddr->} Accessed %{p2->}",
field: "nwparser.p1",
},
});
var msg47 = match({
id: "MESSAGE#351:304001/4",
dissect: {
tokenizer: "JAVA %{p3->}",
field: "nwparser.p2",
},
});
var select12 = linear_select([
msg47,
]);
var msg48 = match({
id: "MESSAGE#351:304001/4",
dissect: {
tokenizer: "URL %{daddr->}: %{url->}",
field: "nwparser.p3",
},
});
var all14 = all_match({
processors: [
dup44,
dup66,
msg46,
select12,
msg48,
],
on_success: processor_chain([
dup67,
set_field({
dest: "nwparser.msg_id1",
value: constant("304001"),
}),
dup2,
dup3,
dup4,
dup5,
dup68,
dup69,
dup70,
dup71,
dup72,
dup73,
]),
});
var msg49 = match({
id: "MESSAGE#352:304001:01/0",
dissect: {
tokenizer: "%{saddr->} Accessed %{p0->}",
field: "nwparser.payload",
},
});
var msg50 = match({
id: "MESSAGE#352:304001:01/2",
dissect: {
tokenizer: "JAVA %{p1->}",
field: "nwparser.p0",
},
});
var select13 = linear_select([
msg50,
]);
var msg51 = match({
id: "MESSAGE#352:304001:01/2",
dissect: {
tokenizer: "URL %{daddr->}: %{url->}",
field: "nwparser.p1",
},
});
var all15 = all_match({
processors: [
msg49,
select13,
msg51,
],
on_success: processor_chain([
dup67,
set_field({
dest: "nwparser.msg_id1",
value: constant("304001:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
dup68,
dup69,
dup70,
dup71,
dup72,
dup73,
]),
});
var select14 = linear_select([
all14,
all15,
]);
var msg52 = match({
id: "MESSAGE#545:400048",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup74,
set_field({
dest: "nwparser.msg_id1",
value: constant("400048"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg53 = match({
id: "MESSAGE#256:212003",
dissect: {
tokenizer: "Unable to receive an %{protocol->} request on interface %{interface->}, error code = %{resultcode->}, will try again.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup75,
set_field({
dest: "nwparser.msg_id1",
value: constant("212003"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg54 = match({
id: "MESSAGE#589:405002",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup76,
set_field({
dest: "nwparser.msg_id1",
value: constant("405002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg55 = match({
id: "MESSAGE#1046:716002/2",
dissect: {
tokenizer: "%{saddr->}> %{network_service->} session terminated: %{result->}",
field: "nwparser.p1",
},
});
var all16 = all_match({
processors: [
dup77,
dup78,
msg55,
],
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("716002"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("session terminated"),
}),
]),
});
var msg56 = match({
id: "MESSAGE#703:507002",
dissect: {
tokenizer: "Moving connection from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->} to non-proxy mode - %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("507002"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Moving connection"),
}),
]),
});
var all17 = all_match({
processors: [
dup79,
dup80,
dup81,
],
on_success: processor_chain([
dup82,
set_field({
dest: "nwparser.msg_id1",
value: constant("715006"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg57 = match({
id: "MESSAGE#993:715006:01",
dissect: {
tokenizer: "IKE got SPI from key engine: SPI = %{dst_spi->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("715006:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("IKE got SPI from key engine"),
}),
]),
});
var select15 = linear_select([
all17,
msg57,
]);
var msg58 = match({
id: "MESSAGE#1064:717003",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup83,
set_field({
dest: "nwparser.msg_id1",
value: constant("717003"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg59 = match({
id: "MESSAGE#1086:717055",
dissect: {
tokenizer: "The \u003c\u003c%{fld1->}> certificate in the trustpoint \u003c\u003c%{cert_hostname->}> has expired. Expiration \u003c\u003c%{fld2->}> Subject Name \u003c\u003c%{cert_subject->}> Issuer Name \u003c\u003c%{dn->}> Serial Number \u003c\u003c%{serial_number->}>",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("717055"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("The certificate in the trustpoint has expired."),
}),
]),
});
var msg60 = match({
id: "MESSAGE#146:109022",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("109022"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg61 = match({
id: "MESSAGE#413:315001",
dissect: {
tokenizer: "Denied SSH session from %{saddr->} on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup84,
set_field({
dest: "nwparser.msg_id1",
value: constant("315001"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Denied session"),
}),
]),
});
var msg62 = match({
id: "MESSAGE#530:400033",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup85,
set_field({
dest: "nwparser.msg_id1",
value: constant("400033"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg63 = match({
id: "MESSAGE#532:400035",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup76,
set_field({
dest: "nwparser.msg_id1",
value: constant("400035"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg64 = match({
id: "MESSAGE#1119:720021",
dissect: {
tokenizer: "(VPN-%{context->}) %{event_description->}.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("720021"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg65 = match({
id: "MESSAGE#197:113020",
dissect: {
tokenizer: "Kerberos error : Clock skew with server %{hostip->} greater than 300 seconds",
field: "nwparser.payload",
},
on_success: processor_chain([
dup86,
set_field({
dest: "nwparser.msg_id1",
value: constant("113020"),
}),
dup18,
dup87,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("Kerberos error"),
}),
]),
});
var msg66 = match({
id: "MESSAGE#804:702201:01/2",
dissect: {
tokenizer: "%{->}received (local %{saddr->} (initiator), remote %{daddr->})",
field: "nwparser.p1",
},
});
var all18 = all_match({
processors: [
dup88,
dup89,
msg66,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("702201:01"),
}),
dup7,
dup14,
dup4,
dup5,
dup2,
dup3,
dup90,
]),
});
var msg67 = match({
id: "MESSAGE#805:702201/2",
dissect: {
tokenizer: "%{->}received (local %{daddr->} (responder), remote %{saddr->})",
field: "nwparser.p1",
},
});
var all19 = all_match({
processors: [
dup88,
dup89,
msg67,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("702201"),
}),
dup7,
dup4,
dup5,
dup2,
dup3,
dup90,
]),
});
var select16 = linear_select([
all18,
all19,
]);
var msg68 = match({
id: "MESSAGE#913:713167/2",
dissect: {
tokenizer: "%{saddr->}, Remote peer has failed user authentication - %{info->}",
field: "nwparser.p1",
},
});
var all20 = all_match({
processors: [
dup22,
dup23,
msg68,
],
on_success: processor_chain([
dup16,
set_field({
dest: "nwparser.msg_id1",
value: constant("713167"),
}),
dup7,
dup17,
dup18,
dup19,
dup2,
dup3,
dup4,
dup5,
dup91,
]),
});
var msg69 = match({
id: "MESSAGE#914:713167:01",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, Remote peer has failed user authentication - %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup16,
set_field({
dest: "nwparser.msg_id1",
value: constant("713167:01"),
}),
dup7,
dup17,
dup18,
dup19,
dup14,
dup2,
dup3,
dup4,
dup5,
dup91,
]),
});
var select17 = linear_select([
all20,
msg69,
]);
var msg70 = match({
id: "MESSAGE#1196:725009:01/0",
dissect: {
tokenizer: "Device proposes the following %{dclass_counter1->} cipher(s) to %{p0->}",
field: "nwparser.payload",
},
});
var msg71 = match({
id: "MESSAGE#1196:725009:01/2",
dissect: {
tokenizer: "%{->} %{interface->}:%{saddr->}/%{sport->} to %{daddr->}/%{dport->}",
field: "nwparser.p1",
},
});
var all21 = all_match({
processors: [
msg70,
dup92,
msg71,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("725009:01"),
}),
dup2,
dup3,
dup4,
dup5,
dup93,
set_field({
dest: "nwparser.dclass_counter1_string",
value: constant("The number of supported ciphers"),
}),
]),
});
var msg72 = match({
id: "MESSAGE#1197:725009",
dissect: {
tokenizer: "Device proposes %{fld1->} cipher(s) to server %{interface->}:%{hostip->}/%{network_port->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("725009"),
}),
dup2,
dup3,
dup4,
dup5,
dup93,
]),
});
var select18 = linear_select([
all21,
msg72,
]);
var msg73 = match({
id: "MESSAGE#602:408002/0",
dissect: {
tokenizer: "ospf %{p0->}",
field: "nwparser.payload",
},
});
var msg74 = match({
id: "MESSAGE#602:408002/2",
dissect: {
tokenizer: "E1%{p1->}",
field: "nwparser.p0",
},
});
var msg75 = match({
id: "MESSAGE#602:408002/2",
dissect: {
tokenizer: "E2%{p1->}",
field: "nwparser.p0",
},
});
var msg76 = match({
id: "MESSAGE#602:408002/2",
dissect: {
tokenizer: "IA%{p1->}",
field: "nwparser.p0",
},
});
var select19 = linear_select([
msg74,
msg75,
msg76,
]);
var msg77 = match({
id: "MESSAGE#602:408002/2",
dissect: {
tokenizer: "%{->}update %{stransaddr->} %{fld1->} [%{fld2->}] via %{daddr->}:%{host->} overriding conflict with %{dtransaddr->} %{fld3->} [%{fld4->}] %{interface->}",
field: "nwparser.p1",
},
});
var all22 = all_match({
processors: [
msg73,
select19,
msg77,
],
on_success: processor_chain([
dup94,
set_field({
dest: "nwparser.msg_id1",
value: constant("408002"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("Ospf IA update conflict"),
}),
]),
});
var msg78 = match({
id: "MESSAGE#685:503001",
dissect: {
tokenizer: "Process %{fld1->}, Nbr %{hostip->} on %{interface->} from %{fld2->} to %{fld3->}, %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup95,
set_field({
dest: "nwparser.msg_id1",
value: constant("503001"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg79 = match({
id: "MESSAGE#756:611104",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("611104"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg80 = match({
id: "MESSAGE#143:109019/2",
dissect: {
tokenizer: "'%{listnum->}' has parsing error; ACE %{p1->}",
field: "nwparser.p0",
},
});
var msg81 = match({
id: "MESSAGE#143:109019/2",
dissect: {
tokenizer: "%{listnum->} has parsing error; ACE %{p1->}",
field: "nwparser.p0",
},
});
var select20 = linear_select([
msg80,
msg81,
]);
var all23 = all_match({
processors: [
dup96,
select20,
dup97,
],
on_success: processor_chain([
dup6,
set_field({
dest: "nwparser.msg_id1",
value: constant("109019"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("ACL has parsing error"),
}),
]),
});
var msg82 = match({
id: "MESSAGE#149:109024",
dissect: {
tokenizer: "Authorization denied from %{saddr->}/%{sport->} to %{daddr->}/%{dport->} (%{result->}) on interface %{interface->} using %{protocol->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup98,
set_field({
dest: "nwparser.msg_id1",
value: constant("109024"),
}),
dup65,
dup99,
dup2,
dup3,
dup4,
dup5,
dup100,
]),
});
var msg83 = match({
id: "MESSAGE#427:317005",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("317005"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg84 = match({
id: "MESSAGE#597:450001",
dissect: {
tokenizer: "Deny traffic for protocol %{protocol->} src %{sinterface->}:%{saddr->}/%{sport->} dst %{dinterface->}:%{daddr->}/%{dport->}, licensed host limit of %{fld1->} exceeded.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup101,
set_field({
dest: "nwparser.msg_id1",
value: constant("450001"),
}),
dup43,
dup99,
dup102,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg85 = match({
id: "MESSAGE#568:402127/0",
dissect: {
tokenizer: "CRYPTO: The ASA is skipping the writing of latest Crypto Archive File as the maximum # of files (%{fld2->}) allowed have been written to %{p0->}",
field: "nwparser.payload",
},
});
var msg86 = match({
id: "MESSAGE#568:402127/2",
dissect: {
tokenizer: "\u003c\u003c%{filename->}> . Please archive \u0026 remove files from %{p1->}",
field: "nwparser.p0",
},
});
var msg87 = match({
id: "MESSAGE#568:402127/2",
dissect: {
tokenizer: "'%{filename->}' . Please archive \u0026 remove files from %{p1->}",
field: "nwparser.p0",
},
});
var msg88 = match({
id: "MESSAGE#568:402127/2",
dissect: {
tokenizer: "%{filename->} . Please archive \u0026 remove files from %{p1->}",
field: "nwparser.p0",
},
});
var select21 = linear_select([
msg86,
msg87,
msg88,
]);
var msg89 = match({
id: "MESSAGE#568:402127/2",
dissect: {
tokenizer: "%{fld3->} if you want more Crypto Archive Files saved",
field: "nwparser.p1",
},
});
var all24 = all_match({
processors: [
msg85,
select21,
msg89,
],
on_success: processor_chain([
dup49,
set_field({
dest: "nwparser.msg_id1",
value: constant("402127"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("Latest Crypto File not written"),
}),
]),
});
var msg90 = match({
id: "MESSAGE#232:202004",
dissect: {
tokenizer: "Could not build portmap translation for %{saddr->}.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup41,
set_field({
dest: "nwparser.msg_id1",
value: constant("202004"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg91 = match({
id: "MESSAGE#257:212004",
dissect: {
tokenizer: "Unable to send an %{protocol->} response to IP Address %{daddr->} Port %{dport->} interface %{interface->}, error code = %{resultcode->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup75,
set_field({
dest: "nwparser.msg_id1",
value: constant("212004"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg92 = match({
id: "MESSAGE#400:309004",
dissect: {
tokenizer: "Manager session limit exceeded. Connection request from %{saddr->} on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup84,
set_field({
dest: "nwparser.msg_id1",
value: constant("309004"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Manager session limit exceeded"),
}),
]),
});
var msg93 = match({
id: "MESSAGE#418:315005",
dissect: {
tokenizer: "SSH session limit exceeded.%{space->}Connection request from %{saddr->} on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup84,
set_field({
dest: "nwparser.msg_id1",
value: constant("315005"),
}),
dup2,
dup3,
dup4,
dup5,
dup103,
]),
});
var msg94 = match({
id: "MESSAGE#170:111006/0",
dissect: {
tokenizer: "Console Login from %{p0->}",
field: "nwparser.payload",
},
});
var msg95 = match({
id: "MESSAGE#170:111006/2",
dissect: {
tokenizer: "%{saddr->}",
field: "nwparser.p1",
},
});
var all25 = all_match({
processors: [
msg94,
dup104,
msg95,
],
on_success: processor_chain([
dup105,
set_field({
dest: "nwparser.msg_id1",
value: constant("111006"),
}),
dup17,
dup106,
dup18,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg96 = match({
id: "MESSAGE#176:112001",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup107,
set_field({
dest: "nwparser.msg_id1",
value: constant("112001"),
}),
dup38,
dup108,
dup39,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg97 = match({
id: "MESSAGE#835:709002",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("709002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg98 = match({
id: "MESSAGE#1283:715071",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("715071"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg99 = match({
id: "MESSAGE#1211:733101/2",
dissect: {
tokenizer: "%{hostip->} is attacking%{p1->}",
field: "nwparser.p0",
},
});
var msg100 = match({
id: "MESSAGE#1211:733101/2",
dissect: {
tokenizer: "%{hostip->} is targeted%{p1->}",
field: "nwparser.p0",
},
});
var select22 = linear_select([
msg99,
msg100,
]);
var msg101 = match({
id: "MESSAGE#1211:733101/2",
dissect: {
tokenizer: ". %{info->}",
field: "nwparser.p1",
},
});
var all26 = all_match({
processors: [
dup44,
select22,
msg101,
],
on_success: processor_chain([
dup109,
set_field({
dest: "nwparser.msg_id1",
value: constant("733101"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg102 = match({
id: "MESSAGE#253:211003",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("211003"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg103 = match({
id: "MESSAGE#367:305005",
dissect: {
tokenizer: "No translation group found for %{protocol->} src %{sinterface->}:%{saddr->}/%{sport->} dst %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("305005"),
}),
dup2,
dup3,
dup4,
dup5,
dup110,
]),
});
var msg104 = match({
id: "MESSAGE#368:305005:01",
dissect: {
tokenizer: "No translation group found for icmp src %{sinterface->}:%{saddr->} dst %{dinterface->}:%{daddr->} (type %{icmptype->}, code %{icmpcode->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("305005:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
dup110,
dup111,
]),
});
var msg105 = match({
id: "MESSAGE#369:305005:02",
dissect: {
tokenizer: "No translation group found for protocol %{protocol->} src %{sinterface->}:%{saddr->} dst %{dinterface->}:%{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("305005:02"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
dup110,
]),
});
var msg106 = match({
id: "MESSAGE#370:305005:03",
dissect: {
tokenizer: "No translation group found for protocol %{protocol->} src %{saddr->} dst %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("305005:03"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
dup110,
]),
});
var select23 = linear_select([
msg103,
msg104,
msg105,
msg106,
]);
var msg107 = match({
id: "MESSAGE#465:332003",
dissect: {
tokenizer: "Web Cache %{saddr->}/%{shost->} acquired",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("332003"),
}),
dup2,
dup3,
dup4,
dup5,
dup112,
]),
});
var msg108 = match({
id: "MESSAGE#506:400009",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup113,
set_field({
dest: "nwparser.msg_id1",
value: constant("400009"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg109 = match({
id: "MESSAGE#291:302012/2",
dissect: {
tokenizer: "allocate %{network_service->} Call Signalling Connection for faddr %{saddr->}/%{sport->} to laddr %{daddr->}",
field: "nwparser.p1",
},
});
var all27 = all_match({
processors: [
dup114,
dup115,
msg109,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("302012"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup116,
]),
});
var msg110 = match({
id: "MESSAGE#751:610101/0",
dissect: {
tokenizer: "Authorization fail%{p0->}",
field: "nwparser.payload",
},
});
var msg111 = match({
id: "MESSAGE#751:610101/2",
dissect: {
tokenizer: "%{->}: Cmd: %{action->} Cmdtype: %{fld1->}",
field: "nwparser.p1",
},
});
var all28 = all_match({
processors: [
msg110,
dup117,
msg111,
],
on_success: processor_chain([
dup84,
set_field({
dest: "nwparser.msg_id1",
value: constant("610101"),
}),
dup65,
dup19,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg112 = match({
id: "MESSAGE#591:405102/2",
dissect: {
tokenizer: "allocate %{service->} Connection for f%{p2->}",
field: "nwparser.p1",
},
});
var all29 = all_match({
processors: [
dup118,
dup115,
msg112,
dup119,
dup120,
dup121,
dup122,
dup123,
dup124,
],
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("405102"),
}),
dup2,
dup3,
dup125,
dup4,
dup5,
]),
});
var msg113 = match({
id: "MESSAGE#759:611303",
dissect: {
tokenizer: "VPNClient: NAT configured for Client Mode with split tunneling: NAT addr: %{stransaddr->} Split Tunnel Networks:",
field: "nwparser.payload",
},
on_success: processor_chain([
dup126,
set_field({
dest: "nwparser.msg_id1",
value: constant("611303"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
dup127,
]),
});
var msg114 = match({
id: "MESSAGE#885:713119",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("713119"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg115 = match({
id: "MESSAGE#0:101001",
dissect: {
tokenizer: "(%{context->})%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup37,
set_field({
dest: "nwparser.msg_id1",
value: constant("101001"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg116 = match({
id: "MESSAGE#188:113011/0",
dissect: {
tokenizer: "AAA retrieved user specific group policy %{p0->}",
field: "nwparser.payload",
},
});
var msg117 = match({
id: "MESSAGE#188:113011/2",
dissect: {
tokenizer: "(%{policyname->}) for user = %{p1->}",
field: "nwparser.p0",
},
});
var msg118 = match({
id: "MESSAGE#188:113011/2",
dissect: {
tokenizer: "%{policyname->} for user = %{p1->}",
field: "nwparser.p0",
},
});
var select24 = linear_select([
msg117,
msg118,
]);
var msg119 = match({
id: "MESSAGE#188:113011/2",
dissect: {
tokenizer: "'%{username->}' ",
field: "nwparser.p1",
},
});
var msg120 = match({
id: "MESSAGE#188:113011/2",
dissect: {
tokenizer: "%{username->} ",
field: "nwparser.p1",
},
});
var select25 = linear_select([
msg119,
msg120,
]);
var all30 = all_match({
processors: [
msg116,
select24,
select25,
],
on_success: processor_chain([
dup83,
set_field({
dest: "nwparser.msg_id1",
value: constant("113011"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("AAA retrieved user specific group policy"),
}),
]),
});
var msg121 = match({
id: "MESSAGE#237:209002",
dissect: {
tokenizer: "IPFRAG: First Frag have not been seen %{saddr->} to %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup85,
set_field({
dest: "nwparser.msg_id1",
value: constant("209002"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("First Frag have not been seen"),
}),
]),
});
var msg122 = match({
id: "MESSAGE#403:311003",
dissect: {
tokenizer: "LU recv thread up%{->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup37,
set_field({
dest: "nwparser.msg_id1",
value: constant("311003"),
}),
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("LU recv thread"),
}),
dup4,
dup5,
]),
});
var msg123 = match({
id: "MESSAGE#1146:721002",
dissect: {
tokenizer: "(WebVPN-%{context->}) %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup37,
set_field({
dest: "nwparser.msg_id1",
value: constant("721002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg124 = match({
id: "MESSAGE#539:400042",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup52,
set_field({
dest: "nwparser.msg_id1",
value: constant("400042"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var all31 = all_match({
processors: [
dup128,
dup129,
dup130,
],
on_success: processor_chain([
dup82,
set_field({
dest: "nwparser.msg_id1",
value: constant("602202:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
dup131,
]),
});
var all32 = all_match({
processors: [
dup128,
dup129,
dup132,
],
on_success: processor_chain([
dup82,
set_field({
dest: "nwparser.msg_id1",
value: constant("602202"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
dup131,
]),
});
var select26 = linear_select([
all31,
all32,
]);
var msg125 = match({
id: "MESSAGE#789:615002",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("615002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg126 = match({
id: "MESSAGE#874:713068/2",
dissect: {
tokenizer: "Username = %{username->}, IP = %{saddr->}, Received non-routine %{p1->}",
field: "nwparser.p0",
},
});
var msg127 = match({
id: "MESSAGE#874:713068/2",
dissect: {
tokenizer: "IP = %{saddr->}, Received non-routine %{p1->}",
field: "nwparser.p0",
},
});
var select27 = linear_select([
msg126,
msg127,
]);
var msg128 = match({
id: "MESSAGE#874:713068/3",
dissect: {
tokenizer: "N%{p2->}",
field: "nwparser.p1",
},
});
var msg129 = match({
id: "MESSAGE#874:713068/3",
dissect: {
tokenizer: "n%{p2->}",
field: "nwparser.p1",
},
});
var select28 = linear_select([
msg128,
msg129,
]);
var msg130 = match({
id: "MESSAGE#874:713068/3",
dissect: {
tokenizer: "otify message: %{p3->}",
field: "nwparser.p2",
},
});
var msg131 = match({
id: "MESSAGE#874:713068/4",
dissect: {
tokenizer: "%{result->} (%{info->}) ",
field: "nwparser.p3",
},
});
var msg132 = match({
id: "MESSAGE#874:713068/4",
dissect: {
tokenizer: "%{result->} ",
field: "nwparser.p3",
},
});
var select29 = linear_select([
msg131,
msg132,
]);
var all33 = all_match({
processors: [
dup79,
select27,
select28,
msg130,
select29,
],
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("713068"),
}),
dup7,
dup133,
dup134,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Received non-routine Notify message"),
}),
]),
});
var all34 = all_match({
processors: [
dup44,
dup135,
dup136,
],
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("111004"),
}),
dup38,
dup137,
dup39,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg133 = match({
id: "MESSAGE#504:400007",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup113,
set_field({
dest: "nwparser.msg_id1",
value: constant("400007"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var all35 = all_match({
processors: [
dup22,
dup23,
dup138,
],
on_success: processor_chain([
dup55,
set_field({
dest: "nwparser.msg_id1",
value: constant("713903"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg134 = match({
id: "MESSAGE#961:713903:01/2",
dissect: {
tokenizer: "Group = %{group->} , IP = %{p1->}",
field: "nwparser.p0",
},
});
var select30 = linear_select([
msg134,
dup139,
dup140,
]);
var all36 = all_match({
processors: [
dup44,
select30,
dup138,
],
on_success: processor_chain([
dup55,
set_field({
dest: "nwparser.msg_id1",
value: constant("713903:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg135 = match({
id: "MESSAGE#962:713903:02",
dissect: {
tokenizer: "IP = %{saddr->} , %{action->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup55,
set_field({
dest: "nwparser.msg_id1",
value: constant("713903:02"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg136 = match({
id: "MESSAGE#963:713903:03/0",
dissect: {
tokenizer: "%{event_description->} on Port %{network_port->} from %{saddr->}:%{sport->} ",
field: "nwparser.payload",
},
});
var select31 = linear_select([
msg136,
dup141,
]);
var all37 = all_match({
processors: [
select31,
],
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("713903:03"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Runt ISAKMP packet discarded on Port"),
}),
]),
});
var select32 = linear_select([
all35,
all36,
msg135,
all37,
]);
var msg137 = match({
id: "MESSAGE#1259:746013",
dissect: {
tokenizer: "%{application->}: Delete IP-User mapping %{saddr->} - %{domain->}\\%{username->} Succeeded - %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup142,
set_field({
dest: "nwparser.msg_id1",
value: constant("746013"),
}),
dup17,
dup143,
dup40,
dup4,
dup5,
dup2,
dup3,
dup144,
]),
});
var msg138 = match({
id: "MESSAGE#1260:746013:01",
dissect: {
tokenizer: "%{application->}: Delete IP-User mapping %{saddr->} - %{domain->}\\%{username->} Failed - VPN user logout",
field: "nwparser.payload",
},
on_success: processor_chain([
dup142,
set_field({
dest: "nwparser.msg_id1",
value: constant("746013:01"),
}),
dup17,
dup143,
dup19,
dup14,
dup4,
dup5,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("VPN user logout"),
}),
set_field({
dest: "nwparser.result",
value: dup145,
}),
]),
});
var select33 = linear_select([
msg137,
msg138,
]);
var msg139 = match({
id: "MESSAGE#313:302016:05/2",
dissect: {
tokenizer: "%{dinterface->}:%{daddr->}/%{dport->}(%{ddomain->}\\%{c_username->}) duration %{duration->} bytes %{p2->}",
field: "nwparser.p1",
},
});
var msg140 = match({
id: "MESSAGE#313:302016:05/3",
dissect: {
tokenizer: "%{bytes->} (%{username->})",
field: "nwparser.p2",
},
});
var msg141 = match({
id: "MESSAGE#313:302016:05/3",
dissect: {
tokenizer: "%{bytes->}",
field: "nwparser.p2",
},
});
var select34 = linear_select([
msg140,
msg141,
]);
var all38 = all_match({
processors: [
dup146,
dup147,
msg139,
select34,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302016:05"),
}),
dup42,
dup43,
dup40,
dup14,
dup2,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var msg142 = match({
id: "MESSAGE#314:302016:07/0",
dissect: {
tokenizer: "Teardown %{protocol->} connection %{connectionid->} for %{sinterface->}:%{saddr->}/%{sport->}(%{fld1->}) to %{dinterface->}:%{daddr->}/%{dport->}(%{ddomain->}\\%{c_username->}) duration %{duration->} bytes %{p0->}",
field: "nwparser.payload",
},
});
var all39 = all_match({
processors: [
msg142,
dup150,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302016:07"),
}),
dup42,
dup43,
dup40,
dup14,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var msg143 = match({
id: "MESSAGE#315:302016:04/0",
dissect: {
tokenizer: "Teardown %{protocol->} connection %{connectionid->} for %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}(%{ddomain->}\\%{c_username->}) duration %{duration->} bytes %{p0->}",
field: "nwparser.payload",
},
});
var all40 = all_match({
processors: [
msg143,
dup150,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302016:04"),
}),
dup42,
dup43,
dup40,
dup14,
dup2,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var msg144 = match({
id: "MESSAGE#316:302016:06/4",
dissect: {
tokenizer: "%{daddr->}/%{dport->}(%{fld20->}) duration %{p3->}",
field: "nwparser.p2",
},
});
var select35 = linear_select([
dup153,
msg144,
]);
var msg145 = match({
id: "MESSAGE#316:302016:06/4",
dissect: {
tokenizer: "%{duration->} bytes %{p4->}",
field: "nwparser.p3",
},
});
var msg146 = match({
id: "MESSAGE#316:302016:06/5",
dissect: {
tokenizer: "%{bytes->} '%{username->}' ",
field: "nwparser.p4",
},
});
var msg147 = match({
id: "MESSAGE#316:302016:06/5",
dissect: {
tokenizer: "%{bytes->} (%{username->}) ",
field: "nwparser.p4",
},
});
var msg148 = match({
id: "MESSAGE#316:302016:06/5",
dissect: {
tokenizer: "%{bytes->}",
field: "nwparser.p4",
},
});
var select36 = linear_select([
msg146,
msg147,
msg148,
]);
var all41 = all_match({
processors: [
dup146,
dup151,
dup152,
select35,
msg145,
select36,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302016:06"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var select37 = linear_select([
dup153,
dup154,
]);
var msg149 = match({
id: "MESSAGE#317:302016/4",
dissect: {
tokenizer: "%{duration->} bytes %{bytes->} %{p4->}",
field: "nwparser.p3",
},
});
var msg150 = match({
id: "MESSAGE#317:302016/6",
dissect: {
tokenizer: "'%{username->}'%{p5->}",
field: "nwparser.p4",
},
});
var msg151 = match({
id: "MESSAGE#317:302016/6",
dissect: {
tokenizer: "(%{username->})%{p5->}",
field: "nwparser.p4",
},
});
var select38 = linear_select([
msg150,
msg151,
]);
var msg152 = match({
id: "MESSAGE#317:302016/6",
dissect: {
tokenizer: "%{->} ",
field: "nwparser.p5",
},
});
var all42 = all_match({
processors: [
dup146,
dup151,
dup152,
select37,
msg149,
select38,
msg152,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302016"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var msg153 = match({
id: "MESSAGE#318:302016:01/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->}(%{fld20->}) to %{p1->}",
field: "nwparser.p0",
},
});
var select39 = linear_select([
dup155,
msg153,
dup156,
]);
var msg154 = match({
id: "MESSAGE#318:302016:01/4",
dissect: {
tokenizer: "%{daddr->}/%{dport->}(%{c_username->}) duration %{p3->}",
field: "nwparser.p2",
},
});
var select40 = linear_select([
dup153,
msg154,
dup154,
]);
var msg155 = match({
id: "MESSAGE#318:302016:01/4",
dissect: {
tokenizer: "%{duration->} bytes %{bytes->}",
field: "nwparser.p3",
},
});
var all43 = all_match({
processors: [
dup146,
select39,
dup152,
select40,
msg155,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302016:01"),
}),
dup42,
dup43,
dup40,
dup14,
dup2,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var msg156 = match({
id: "MESSAGE#319:302016:02",
dissect: {
tokenizer: "Teardown %{protocol->} connection %{connectionid->} for %{sinterface->} %{saddr->}/%{sport->} gaddr %{hostip->}/%{network_port->} %{dinterface->} %{daddr->}/%{dport->} duration %{duration->} bytes %{bytes->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302016:02"),
}),
dup42,
dup43,
dup40,
dup14,
dup2,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var msg157 = match({
id: "MESSAGE#320:302016:03",
dissect: {
tokenizer: "Teardown %{protocol->} connection for %{sinterface->} %{saddr->}/%{sport->} gaddr %{hostip->}/%{network_port->} %{dinterface->} %{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302016:03"),
}),
dup42,
dup43,
dup40,
dup14,
dup2,
dup3,
dup4,
dup5,
dup27,
dup149,
]),
});
var select41 = linear_select([
all38,
all39,
all40,
all41,
all42,
all43,
msg156,
msg157,
]);
var msg158 = match({
id: "MESSAGE#389:306001",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup157,
set_field({
dest: "nwparser.msg_id1",
value: constant("306001"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg159 = match({
id: "MESSAGE#864:713042",
dissect: {
tokenizer: "IKE Initiator unable to find policy: Intf %{interface->}, Src: %{saddr->}, Dst: %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("713042"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var all44 = all_match({
processors: [
dup77,
dup78,
dup158,
],
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("722029"),
}),
dup2,
dup3,
dup4,
dup5,
dup159,
]),
});
var msg160 = match({
id: "MESSAGE#1083:717037",
dissect: {
tokenizer: "Tunnel group search using certificate maps failed for peer certificate: serial number: %{serial_number->}, subject name: %{cert_subject->} issuer_name: %{dn->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup160,
set_field({
dest: "nwparser.msg_id1",
value: constant("717037"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg161 = match({
id: "MESSAGE#19:103007",
dissect: {
tokenizer: "(%{context->})%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup161,
set_field({
dest: "nwparser.msg_id1",
value: constant("103007"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg162 = match({
id: "MESSAGE#508:400011",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup26,
set_field({
dest: "nwparser.msg_id1",
value: constant("400011"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg163 = match({
id: "MESSAGE#550:401002/1",
dissect: {
tokenizer: "%{->}added: %{result->} ",
field: "nwparser.p0",
},
});
var msg164 = match({
id: "MESSAGE#550:401002/1",
dissect: {
tokenizer: "s added %{->}",
field: "nwparser.p0",
},
});
var select42 = linear_select([
msg163,
msg164,
]);
var all45 = all_match({
processors: [
dup162,
select42,
],
on_success: processor_chain([
dup163,
set_field({
dest: "nwparser.msg_id1",
value: constant("401002"),
}),
dup164,
dup38,
dup14,
dup4,
dup5,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("Shun(s) added"),
}),
]),
});
var msg165 = match({
id: "MESSAGE#1014:715041",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{action->} of type %{event_description->}, %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("715041"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg166 = match({
id: "MESSAGE#1069:717008",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup165,
set_field({
dest: "nwparser.msg_id1",
value: constant("717008"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg167 = match({
id: "MESSAGE#1303:717041",
dissect: {
tokenizer: "Local CA Server event: %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup166,
set_field({
dest: "nwparser.msg_id1",
value: constant("717041"),
}),
dup14,
dup2,
dup5,
dup3,
]),
});
var msg168 = match({
id: "MESSAGE#16:103004",
dissect: {
tokenizer: "(%{context->})%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup1,
set_field({
dest: "nwparser.msg_id1",
value: constant("103004"),
}),
dup2,
dup3,
dup4,
dup5,
dup167,
]),
});
var msg169 = match({
id: "MESSAGE#583:403504",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("403504"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg170 = match({
id: "MESSAGE#1011:715039/2",
dissect: {
tokenizer: "%{saddr->}, %{event_description->}.",
field: "nwparser.p1",
},
});
var all46 = all_match({
processors: [
dup22,
dup23,
msg170,
],
on_success: processor_chain([
dup50,
set_field({
dest: "nwparser.msg_id1",
value: constant("715039"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg171 = match({
id: "MESSAGE#1012:715039:01",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup50,
set_field({
dest: "nwparser.msg_id1",
value: constant("715039:01"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var select43 = linear_select([
all46,
msg171,
]);
var msg172 = match({
id: "MESSAGE#1150:721012",
dissect: {
tokenizer: "(WebVPN-%{context->}) Enable APCF XML file path %{filename->} on the standby unit",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("721012"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Enable APCF XML file path on standby unit"),
}),
]),
});
var all47 = all_match({
processors: [
dup77,
dup78,
dup168,
],
on_success: processor_chain([
dup169,
set_field({
dest: "nwparser.msg_id1",
value: constant("724004"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg173 = match({
id: "MESSAGE#36:105011",
dissect: {
tokenizer: "(%{context->})%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup49,
set_field({
dest: "nwparser.msg_id1",
value: constant("105011"),
}),
dup2,
dup3,
dup167,
dup4,
dup5,
]),
});
var msg174 = match({
id: "MESSAGE#248:210010",
dissect: {
tokenizer: "LU make UDP connection for %{saddr->}:%{sport->} %{daddr->}:%{dport->} failed",
field: "nwparser.payload",
},
on_success: processor_chain([
dup165,
set_field({
dest: "nwparser.msg_id1",
value: constant("210010"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Unable to allocate a new record for a UDP connection"),
}),
dup170,
]),
});
var msg175 = match({
id: "MESSAGE#902:713136/1",
dissect: {
tokenizer: "Group = %{group->}, Username = '%{username->}' , IP = %{p0->}",
field: "nwparser.payload",
},
});
var msg176 = match({
id: "MESSAGE#902:713136/1",
dissect: {
tokenizer: "%{->}Group = %{group->}, Username = %{username->} , IP = %{p0->}",
field: "nwparser.payload",
},
});
var msg177 = match({
id: "MESSAGE#902:713136/1",
dissect: {
tokenizer: "%{->}Group = %{group->}, IP = %{p0->}",
field: "nwparser.payload",
},
});
var select44 = linear_select([
msg175,
msg176,
msg177,
]);
var msg178 = match({
id: "MESSAGE#902:713136/1",
dissect: {
tokenizer: "%{saddr->}, %{action->} [%{fld1->}]",
field: "nwparser.p0",
},
});
var all48 = all_match({
processors: [
select44,
msg178,
],
on_success: processor_chain([
dup55,
set_field({
dest: "nwparser.msg_id1",
value: constant("713136"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg179 = match({
id: "MESSAGE#1044:715080",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{event_description->}: %{duration->} seconds.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup58,
set_field({
dest: "nwparser.msg_id1",
value: constant("715080"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg180 = match({
id: "MESSAGE#14:120012/0",
dissect: {
tokenizer: "User \"%{username->}\" chose to %{p0->}",
field: "nwparser.payload",
},
});
var msg181 = match({
id: "MESSAGE#14:120012/2",
dissect: {
tokenizer: "disabl%{p1->}",
field: "nwparser.p0",
},
});
var msg182 = match({
id: "MESSAGE#14:120012/2",
dissect: {
tokenizer: "postpon%{p1->}",
field: "nwparser.p0",
},
});
var select45 = linear_select([
msg181,
msg182,
]);
var msg183 = match({
id: "MESSAGE#14:120012/2",
dissect: {
tokenizer: "e call-home anonymous reporting at the prompt.%{->}",
field: "nwparser.p1",
},
});
var all49 = all_match({
processors: [
msg180,
select45,
msg183,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("120012"),
}),
dup4,
dup5,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("User chose to disable or postpone call-home anonymous reporting"),
}),
]),
});
var msg184 = match({
id: "MESSAGE#393:307003",
dissect: {
tokenizer: "telnet login session failed from %{saddr->} (%{result->}) on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup171,
set_field({
dest: "nwparser.msg_id1",
value: constant("307003"),
}),
dup43,
dup106,
dup18,
dup19,
dup2,
dup3,
dup4,
dup5,
dup172,
]),
});
var msg185 = match({
id: "MESSAGE#394:307003:01",
dissect: {
tokenizer: "telnet login session failed from %{saddr->} (%{result->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup171,
set_field({
dest: "nwparser.msg_id1",
value: constant("307003:01"),
}),
dup43,
dup106,
dup18,
dup19,
dup14,
dup2,
dup3,
dup4,
dup5,
dup172,
]),
});
var select46 = linear_select([
msg184,
msg185,
]);
var msg186 = match({
id: "MESSAGE#723:603104/0",
dissect: {
tokenizer: "PPTP Tunnel created, tunnel_id is %{fld1->}, remote_peer_ip is %{saddr->}, ppp_virtual_interface_id is %{fld2->}, client_dynamic_ip is %{daddr->}, username is %{p0->}",
field: "nwparser.payload",
},
});
var msg187 = match({
id: "MESSAGE#723:603104/2",
dissect: {
tokenizer: "'%{username->}' , MPPE_key_strength is %{p1->}",
field: "nwparser.p0",
},
});
var msg188 = match({
id: "MESSAGE#723:603104/2",
dissect: {
tokenizer: "%{username->} , MPPE_key_strength is %{p1->}",
field: "nwparser.p0",
},
});
var select47 = linear_select([
msg187,
msg188,
]);
var msg189 = match({
id: "MESSAGE#723:603104/2",
dissect: {
tokenizer: "%{fld3->}",
field: "nwparser.p1",
},
});
var all50 = all_match({
processors: [
msg186,
select47,
msg189,
],
on_success: processor_chain([
dup82,
set_field({
dest: "nwparser.msg_id1",
value: constant("603104"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("PPTP Tunnel created"),
}),
]),
});
var msg190 = match({
id: "MESSAGE#1123:720027",
dissect: {
tokenizer: "(VPN-%{context->}) %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup157,
set_field({
dest: "nwparser.msg_id1",
value: constant("720027"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg191 = match({
id: "MESSAGE#1024:715052/2",
dissect: {
tokenizer: "%{group->}, Username = %{username->}, IP = %{saddr->}, Old P1 SA is being deleted but new SA is DEAD, %{p1->}",
field: "nwparser.p0",
},
});
var msg192 = match({
id: "MESSAGE#1024:715052/2",
dissect: {
tokenizer: "%{group->}, IP = %{saddr->}, Old P1 SA is being deleted but new SA is DEAD, %{p1->}",
field: "nwparser.p0",
},
});
var select48 = linear_select([
msg191,
msg192,
]);
var all51 = all_match({
processors: [
dup9,
select48,
dup173,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("715052"),
}),
dup7,
dup4,
dup5,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("Old P1 SA is being deleted but new SA is DEAD"),
}),
]),
});
var msg193 = match({
id: "MESSAGE#1084:717039",
dissect: {
tokenizer: "Local CA Server internal error detected: %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("717039"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Local CA Server internal error detected"),
}),
]),
});
var msg194 = match({
id: "MESSAGE#1108:718069",
dissect: {
tokenizer: "Stop VPN Load Balancing in context %{context->}.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("718069"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Stop VPN Load Balancing"),
}),
]),
});
var msg195 = match({
id: "MESSAGE#109:107001:01",
dissect: {
tokenizer: "%{saddr->} attempted to ping %{daddr->}.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("107001:01"),
}),
dup42,
dup43,
dup40,
dup14,
dup2,
dup3,
dup4,
dup5,
dup27,
]),
});
var msg196 = match({
id: "MESSAGE#110:107001",
dissect: {
tokenizer: "RIP auth failed from %{saddr->}: version=%{fld1->}, type=%{fld2->}, mode=%{fld3->}, sequence=%{fld4->} on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup16,
set_field({
dest: "nwparser.msg_id1",
value: constant("107001"),
}),
dup18,
dup19,
dup2,
dup3,
dup4,
dup5,
dup27,
set_field({
dest: "nwparser.event_description",
value: constant("RIP auth failure"),
}),
]),
});
var select49 = linear_select([
msg195,
msg196,
]);
var msg197 = match({
id: "MESSAGE#607:409005",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup41,
set_field({
dest: "nwparser.msg_id1",
value: constant("409005"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg198 = match({
id: "MESSAGE#918:713184/2",
dissect: {
tokenizer: "%{saddr->}, Client Type: %{product->} Client Application Version: %{version->}",
field: "nwparser.p1",
},
});
var all52 = all_match({
processors: [
dup22,
dup23,
msg198,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("713184"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg199 = match({
id: "MESSAGE#919:713184:01",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, Client Type: %{product->} Client Application Version: %{version->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("713184:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var select50 = linear_select([
all52,
msg199,
]);
var msg200 = match({
id: "MESSAGE#970:713905:04",
dissect: {
tokenizer: "IKE port %{network_port->} for IPSec UDP already reserved on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("713905:04"),
}),
dup7,
dup14,
dup4,
dup5,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("IKE port for IPSec UDP already reserved on interface"),
}),
]),
});
var all53 = all_match({
processors: [
dup22,
dup23,
dup174,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("713905"),
}),
dup7,
dup4,
dup5,
dup2,
dup3,
]),
});
var msg201 = match({
id: "MESSAGE#972:713905:01/2",
dissect: {
tokenizer: "%{event_description->} from %{fld1->} port %{sport->} to %{daddr->} port %{dport->} ",
field: "nwparser.p1",
},
});
var msg202 = match({
id: "MESSAGE#972:713905:01/2",
dissect: {
tokenizer: "%{->} %{event_description->}",
field: "nwparser.p1",
},
});
var select51 = linear_select([
msg201,
msg202,
]);
var all54 = all_match({
processors: [
dup44,
dup175,
select51,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("713905:01"),
}),
dup7,
dup14,
dup4,
dup5,
dup2,
dup3,
]),
});
var msg203 = match({
id: "MESSAGE#973:713905:02",
dissect: {
tokenizer: "INFO: %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("713905:02"),
}),
dup7,
dup14,
dup4,
dup5,
dup2,
dup3,
]),
});
var all55 = all_match({
processors: [
dup176,
dup23,
dup174,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("713905:03"),
}),
dup7,
dup14,
dup4,
dup5,
dup2,
dup3,
]),
});
var select52 = linear_select([
msg200,
all53,
all54,
msg203,
all55,
]);
var msg204 = match({
id: "MESSAGE#227:201013",
dissect: {
tokenizer: "Per-client connection limit exceeded %{fld1->}/%{fld2->} for %{direction->} packet from %{saddr->}/%{sport->} to %{daddr->}/%{dport->} on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("201013"),
}),
dup2,
dup3,
dup4,
dup5,
dup177,
]),
});
var msg205 = match({
id: "MESSAGE#238:209003",
dissect: {
tokenizer: "Fragment database limit of %{fld1->} exceeded: %{space->} src = %{saddr->}, %{space->} dest = %{daddr->}, proto = %{protocol->}, id = %{fld2->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("209003"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
set_field({
dest: "nwparser.event_description",
value: constant("Fragment database limit exceeded"),
}),
]),
});
var msg206 = match({
id: "MESSAGE#1162:722025",
dissect: {
tokenizer: "SVC Global Compression Disabled%{->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("722025"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg207 = match({
id: "MESSAGE#525:400028",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup109,
set_field({
dest: "nwparser.msg_id1",
value: constant("400028"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg208 = match({
id: "MESSAGE#541:400044",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup52,
set_field({
dest: "nwparser.msg_id1",
value: constant("400044"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg209 = match({
id: "MESSAGE#1050:716009",
dissect: {
tokenizer: "Group \u003c\u003c%{group->}> User \u003c\u003c%{username->}> IP \u003c\u003c%{hostip->}> %{result->}. ACL parse error",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("716009"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("ACL parse error"),
}),
]),
});
var msg210 = match({
id: "MESSAGE#1132:720039",
dissect: {
tokenizer: "(VPN-%{context->}) %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup157,
set_field({
dest: "nwparser.msg_id1",
value: constant("720039"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg211 = match({
id: "MESSAGE#111:107002",
dissect: {
tokenizer: "RIP pkt failed from %{saddr->}: version=%{fld1->} on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("107002"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
set_field({
dest: "nwparser.event_description",
value: constant("RIP packet failure"),
}),
]),
});
var msg212 = match({
id: "MESSAGE#147:109023",
dissect: {
tokenizer: "User from %{saddr->}/%{sport->} to %{daddr->}/%{dport->} on interface %{interface->} using %{protocol->} must authenticate before using this service",
field: "nwparser.payload",
},
on_success: processor_chain([
dup83,
set_field({
dest: "nwparser.msg_id1",
value: constant("109023"),
}),
dup17,
dup18,
dup178,
dup2,
dup3,
dup4,
dup5,
dup100,
]),
});
var msg213 = match({
id: "MESSAGE#148:109023:01",
dissect: {
tokenizer: "User from %{saddr->}/%{sport->} to %{daddr->}/%{dport->} on interface %{interface->} must authenticate before using this service",
field: "nwparser.payload",
},
on_success: processor_chain([
dup83,
set_field({
dest: "nwparser.msg_id1",
value: constant("109023:01"),
}),
dup17,
dup18,
dup178,
dup14,
dup2,
dup3,
dup4,
dup5,
dup100,
]),
});
var select53 = linear_select([
msg212,
msg213,
]);
var msg214 = match({
id: "MESSAGE#150:109025/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->} to %{daddr->}/%{dport->} on interface %{interface->} using %{protocol->}",
field: "nwparser.p1",
},
});
var all56 = all_match({
processors: [
dup179,
dup61,
msg214,
],
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("109025"),
}),
dup65,
dup17,
dup99,
dup2,
dup3,
dup4,
dup5,
dup100,
]),
});
var msg215 = match({
id: "MESSAGE#1282:713177",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, Received remote Proxy Host FQDN in ID Payload: Host Name: %{hostname->} Address %{hostip->}, Protocol %{protocol->}, Port %{sport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("713177"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Received remote Proxy Host"),
}),
]),
});
var msg216 = match({
id: "MESSAGE#745:608001:01",
dissect: {
tokenizer: "Pre-allocate Skinny %{fld1->} secondary channel for %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->} from %{info->} message",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("608001:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg217 = match({
id: "MESSAGE#746:608001",
dissect: {
tokenizer: "Pre-allocate Skinny %{fld1->} secondary channel for %{sinterface->}:%{saddr->} to %{dinterface->}:%{daddr->}/%{dport->} from %{info->} message",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("608001"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var select54 = linear_select([
msg216,
msg217,
]);
var msg218 = match({
id: "MESSAGE#1172:722037/3",
dissect: {
tokenizer: "%{saddr->} (%{fld1->}) > SVC closing connection: %{p2->}",
field: "nwparser.p1",
},
});
var msg219 = match({
id: "MESSAGE#1172:722037/3",
dissect: {
tokenizer: "%{saddr->} > SVC closing connection: %{p2->}",
field: "nwparser.p1",
},
});
var select55 = linear_select([
msg218,
msg219,
]);
var msg220 = match({
id: "MESSAGE#1172:722037/3",
dissect: {
tokenizer: "%{info->}.",
field: "nwparser.p2",
},
});
var all57 = all_match({
processors: [
dup181,
dup182,
select55,
msg220,
],
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("722037"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("closing connection"),
}),
]),
});
var msg221 = match({
id: "MESSAGE#1181:722055/0",
dissect: {
tokenizer: "Group \u003c\u003c%{group->}> User \u003c\u003c%{username->}> IP \u003c\u003c%{saddr->}> Client Type: %{application->} %{p0->}",
field: "nwparser.payload",
},
});
var msg222 = match({
id: "MESSAGE#1181:722055/1",
dissect: {
tokenizer: "for %{product->} %{version->}",
field: "nwparser.p0",
},
});
var msg223 = match({
id: "MESSAGE#1181:722055/1",
dissect: {
tokenizer: "v%{version->}",
field: "nwparser.p0",
},
});
var select56 = linear_select([
msg222,
msg223,
]);
var all58 = all_match({
processors: [
msg221,
select56,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("722055"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg224 = match({
id: "MESSAGE#475:338005/2",
dissect: {
tokenizer: "ilter dropped blacklisted %{protocol->} traffic from %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->}), source %{fld1->} resolved from %{fld2->} list:%{web_domain->} threat-level: %{severity->}, category: %{result->}",
field: "nwparser.p1",
},
});
var all59 = all_match({
processors: [
dup183,
dup184,
msg224,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("338005"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg225 = match({
id: "MESSAGE#537:400040",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup109,
set_field({
dest: "nwparser.msg_id1",
value: constant("400040"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg226 = match({
id: "MESSAGE#949:713255",
dissect: {
tokenizer: "IP = %{saddr->}, Received %{protocol->} Aggressive Mode message %{fld1->} with unknown tunnel group name '%{group->}'.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("713255"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg227 = match({
id: "MESSAGE#842:710001",
dissect: {
tokenizer: "%{protocol->} access requested from %{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{service->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("710001"),
}),
dup42,
dup43,
set_field({
dest: "nwparser.ec_activity",
value: constant("Request"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
set_field({
dest: "nwparser.result",
value: constant("access requested"),
}),
]),
});
var msg228 = match({
id: "MESSAGE#371:305006:02",
dissect: {
tokenizer: "%{service->} translation creation failed for protocol %{protocol->} src %{sinterface->}:%{saddr->} dst %{dinterface->}:%{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("305006:02"),
}),
dup42,
dup43,
dup19,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("translation creation failed for protocol"),
}),
]),
});
var msg229 = match({
id: "MESSAGE#372:305006",
dissect: {
tokenizer: "%{service->} translation creation failed for %{protocol->} src %{sinterface->}:%{saddr->}/%{sport->} dst %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("305006"),
}),
dup42,
dup43,
dup19,
dup2,
dup3,
dup4,
dup5,
dup185,
]),
});
var msg230 = match({
id: "MESSAGE#373:305006:01",
dissect: {
tokenizer: "%{service->} translation creation failed for icmp src %{sinterface->}:%{saddr->} dst %{dinterface->}:%{daddr->} (type %{icmptype->}, code %{icmpcode->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("305006:01"),
}),
dup42,
dup43,
dup19,
dup14,
dup2,
dup3,
dup4,
dup5,
dup111,
dup185,
]),
});
var select57 = linear_select([
msg228,
msg229,
msg230,
]);
var msg231 = match({
id: "MESSAGE#1168:722032/2",
dissect: {
tokenizer: "%{saddr->}> New %{p2->}",
field: "nwparser.p1",
},
});
var msg232 = match({
id: "MESSAGE#1168:722032/4",
dissect: {
tokenizer: "%{protocol->} %{p3->}",
field: "nwparser.p2",
},
});
var select58 = linear_select([
msg232,
]);
var msg233 = match({
id: "MESSAGE#1168:722032/4",
dissect: {
tokenizer: "SVC connection replacing old connection.%{->}",
field: "nwparser.p3",
},
});
var all60 = all_match({
processors: [
dup77,
dup78,
msg231,
select58,
msg233,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("722032"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("replacing old connection"),
}),
]),
});
var msg234 = match({
id: "MESSAGE#1239:737014",
dissect: {
tokenizer: "%{process->}: Freeing AAA address %{hostip->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("737014"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Freeing AAA address"),
}),
]),
});
var msg235 = match({
id: "MESSAGE#512:400015",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup26,
set_field({
dest: "nwparser.msg_id1",
value: constant("400015"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg236 = match({
id: "MESSAGE#664:421006",
dissect: {
tokenizer: "There are %{fld1->} users of %{product->} during the past %{fld2->} hours",
field: "nwparser.payload",
},
on_success: processor_chain([
dup186,
set_field({
dest: "nwparser.msg_id1",
value: constant("421006"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg237 = match({
id: "MESSAGE#736:605004/0",
dissect: {
tokenizer: "Login denied from %{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{service->} for user %{p0->}",
field: "nwparser.payload",
},
});
var all61 = all_match({
processors: [
msg237,
dup187,
],
on_success: processor_chain([
dup171,
set_field({
dest: "nwparser.msg_id1",
value: constant("605004"),
}),
dup17,
dup106,
dup18,
dup19,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: dup188,
}),
set_field({
dest: "nwparser.result",
value: dup188,
}),
]),
});
var msg238 = match({
id: "MESSAGE#737:605004:01/0",
dissect: {
tokenizer: "%{action->} for user %{p0->}",
field: "nwparser.payload",
},
});
var all62 = all_match({
processors: [
msg238,
dup187,
],
on_success: processor_chain([
dup171,
set_field({
dest: "nwparser.msg_id1",
value: constant("605004:01"),
}),
dup17,
dup106,
dup18,
dup19,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var select59 = linear_select([
all61,
all62,
]);
var msg239 = match({
id: "MESSAGE#1151:721016/2",
dissect: {
tokenizer: "%{saddr->} has been created.",
field: "nwparser.p1",
},
});
var all63 = all_match({
processors: [
dup189,
dup190,
msg239,
],
on_success: processor_chain([
dup82,
set_field({
dest: "nwparser.msg_id1",
value: constant("721016"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("session created"),
}),
]),
});
var msg240 = match({
id: "MESSAGE#130:109009",
dissect: {
tokenizer: "Authorization denied from %{saddr->}/%{sport->} to %{daddr->}/%{dport->} (not authenticated)",
field: "nwparser.payload",
},
on_success: processor_chain([
dup98,
set_field({
dest: "nwparser.msg_id1",
value: constant("109009"),
}),
dup17,
dup99,
dup65,
dup2,
dup3,
dup4,
dup5,
dup191,
]),
});
var msg241 = match({
id: "MESSAGE#321:302017",
dissect: {
tokenizer: "Built inbound GRE connection %{connectionid->} from %{sinterface->}:%{saddr->} (%{stransaddr->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup82,
set_field({
dest: "nwparser.msg_id1",
value: constant("302017"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup192,
dup193,
]),
});
var msg242 = match({
id: "MESSAGE#322:302017:01",
dissect: {
tokenizer: "Built outbound GRE connection %{connectionid->} from %{dinterface->}:%{daddr->} (%{dtransaddr->}) to %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup82,
set_field({
dest: "nwparser.msg_id1",
value: constant("302017:01"),
}),
dup42,
dup43,
dup40,
dup14,
dup2,
dup3,
dup4,
dup5,
dup194,
dup193,
]),
});
var select60 = linear_select([
msg241,
msg242,
]);
var msg243 = match({
id: "MESSAGE#398:309001",
dissect: {
tokenizer: "Denied manager connection from %{saddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup84,
set_field({
dest: "nwparser.msg_id1",
value: constant("309001"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("denied manager connection"),
}),
]),
});
var msg244 = match({
id: "MESSAGE#429:318002",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup75,
set_field({
dest: "nwparser.msg_id1",
value: constant("318002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg245 = match({
id: "MESSAGE#1188:725003/0",
dissect: {
tokenizer: "SSL client %{interface->}:%{hostip->}/%{network_port->} %{p0->}",
field: "nwparser.payload",
},
});
var msg246 = match({
id: "MESSAGE#1188:725003/1",
dissect: {
tokenizer: "to %{daddr->}/%{dport->} %{action->}",
field: "nwparser.p0",
},
});
var msg247 = match({
id: "MESSAGE#1188:725003/1",
dissect: {
tokenizer: "%{action->}.",
field: "nwparser.p0",
},
});
var select61 = linear_select([
msg246,
msg247,
]);
var all64 = all_match({
processors: [
msg245,
select61,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("725003"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg248 = match({
id: "MESSAGE#1288:752006",
dissect: {
tokenizer: "Tunnel Manager failed to dispatch a %{fld1->} message. Probable mis-configuration of the crypto map or tunnel-group. %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("752006"),
}),
dup4,
dup5,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("Tunnel Manager failed to dispatch a message. Probable mis-configuration of the crypto map or tunnel-group"),
}),
]),
});
var msg249 = match({
id: "MESSAGE#661:421001",
dissect: {
tokenizer: "TCP flow from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->} is skipped because %{application->} has failed",
field: "nwparser.payload",
},
on_success: processor_chain([
dup50,
set_field({
dest: "nwparser.msg_id1",
value: constant("421001"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("TCP flow skipped"),
}),
set_field({
dest: "nwparser.result",
value: constant("process failure"),
}),
]),
});
var msg250 = match({
id: "MESSAGE#901:713134",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, Mismatch: %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("713134"),
}),
dup7,
dup38,
dup39,
dup19,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("algorithm mismatch"),
}),
]),
});
var msg251 = match({
id: "MESSAGE#44:105036",
dissect: {
tokenizer: "(%{context->}) %{event_description->} %{fld1->}, seq = %{fld2->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup195,
set_field({
dest: "nwparser.msg_id1",
value: constant("105036"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg252 = match({
id: "MESSAGE#45:105036:01",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup195,
set_field({
dest: "nwparser.msg_id1",
value: constant("105036:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var select62 = linear_select([
msg251,
msg252,
]);
var msg253 = match({
id: "MESSAGE#80:106015",
dissect: {
tokenizer: "Deny %{protocol->} (no connection) from %{saddr->}/%{sport->} to %{daddr->}/%{dport->} flags %{fld1->} on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("106015"),
}),
dup99,
dup102,
dup43,
dup2,
dup3,
dup4,
dup5,
dup27,
dup196,
]),
});
var msg254 = match({
id: "MESSAGE#81:106015:01",
dissect: {
tokenizer: "Deny %{protocol->} (no connection) from %{saddr->}/%{sport->} to %{daddr->}/%{dport->} flags %{fld1->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("106015:01"),
}),
dup99,
dup102,
dup43,
dup14,
dup2,
dup3,
dup4,
dup5,
dup27,
dup196,
]),
});
var select63 = linear_select([
msg253,
msg254,
]);
var msg255 = match({
id: "MESSAGE#104:106102:02/0",
dissect: {
tokenizer: "access-list %{listnum->} denied %{p0->}",
field: "nwparser.payload",
},
});
var all65 = all_match({
processors: [
msg255,
dup197,
dup198,
dup199,
dup200,
dup201,
dup202,
],
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("106102:02"),
}),
dup42,
dup43,
dup19,
dup14,
dup2,
dup3,
dup4,
dup5,
dup203,
set_field({
dest: "nwparser.event_description",
value: constant("deny"),
}),
]),
});
var msg256 = match({
id: "MESSAGE#105:106102:01/0",
dissect: {
tokenizer: "access-list %{listnum->} permitted %{p0->}",
field: "nwparser.payload",
},
});
var all66 = all_match({
processors: [
msg256,
dup197,
dup198,
dup199,
dup200,
dup201,
dup202,
],
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("106102:01"),
}),
dup42,
dup43,
dup40,
dup14,
dup2,
dup3,
dup4,
dup5,
dup203,
set_field({
dest: "nwparser.event_description",
value: constant("permit"),
}),
]),
});
var msg257 = match({
id: "MESSAGE#106:106102",
dissect: {
tokenizer: "access-list %{listnum->} url %{url->} hit-cnt %{dclass_counter1->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("106102"),
}),
dup2,
dup3,
dup203,
dup4,
dup5,
]),
});
var select64 = linear_select([
all65,
all66,
msg257,
]);
var msg258 = match({
id: "MESSAGE#587:404102",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup85,
set_field({
dest: "nwparser.msg_id1",
value: constant("404102"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg259 = match({
id: "MESSAGE#1241:737016",
dissect: {
tokenizer: "%{process->}: Freeing local pool address %{hostip->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("737016"),
}),
dup2,
dup3,
dup205,
dup4,
dup5,
]),
});
var msg260 = match({
id: "MESSAGE#1242:737016:01",
dissect: {
tokenizer: "%{process->}: Session=%{sessionid->}, Freeing local pool address %{hostip->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("737016:01"),
}),
dup2,
dup3,
dup205,
dup4,
dup5,
]),
});
var select65 = linear_select([
msg259,
msg260,
]);
var msg261 = match({
id: "MESSAGE#643:415010",
dissect: {
tokenizer: "%{sigid->} HTTP protocol violation detected - %{listnum->} HTTP Protocol not detected from %{saddr->} to %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup206,
set_field({
dest: "nwparser.msg_id1",
value: constant("415010"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.context",
value: constant("HTTP protocol violation detected"),
}),
]),
});
var msg262 = match({
id: "MESSAGE#653:419001",
dissect: {
tokenizer: "%{action->} from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}, reason: %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("419001"),
}),
dup42,
dup43,
dup19,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg263 = match({
id: "MESSAGE#691:505002",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup207,
set_field({
dest: "nwparser.msg_id1",
value: constant("505002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg264 = match({
id: "MESSAGE#1114:720005",
dissect: {
tokenizer: "(VPN-%{context->}) %{event_description->}.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("720005"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg265 = match({
id: "MESSAGE#431:318004",
dissect: {
tokenizer: "area %{fld1->} lsid %{fld2->} mask %{fld3->} adv %{fld4->} type %{fld5->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("318004"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var select66 = linear_select([
dup208,
dup209,
dup210,
]);
var msg266 = match({
id: "MESSAGE#1037:715065/2",
dissect: {
tokenizer: "%{action->} history (%{fld1->})",
field: "nwparser.p1",
},
});
var all67 = all_match({
processors: [
dup44,
select66,
msg266,
],
on_success: processor_chain([
dup55,
set_field({
dest: "nwparser.msg_id1",
value: constant("715065"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg267 = match({
id: "MESSAGE#1216:734003:01/2",
dissect: {
tokenizer: "%{hostip->}: Session Attribute endpoint.device.hostname=\"%{hostname->}\"",
field: "nwparser.p1",
},
});
var all68 = all_match({
processors: [
dup211,
dup212,
msg267,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("734003:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg268 = match({
id: "MESSAGE#1217:734003:02/2",
dissect: {
tokenizer: "%{hostip->}: Session Attribute endpoint.device.MAC[\"%{macaddr->}\"]=\"%{fld2->}\"",
field: "nwparser.p1",
},
});
var all69 = all_match({
processors: [
dup211,
dup212,
msg268,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("734003:02"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg269 = match({
id: "MESSAGE#1218:734003:03/2",
dissect: {
tokenizer: "%{hostip->}: Session Attribute endpoint.os.version=\"%{version->}\"",
field: "nwparser.p1",
},
});
var all70 = all_match({
processors: [
dup211,
dup212,
msg269,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("734003:03"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg270 = match({
id: "MESSAGE#1219:734003/2",
dissect: {
tokenizer: "%{hostip->}: %{result->}",
field: "nwparser.p1",
},
});
var all71 = all_match({
processors: [
dup211,
dup212,
msg270,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("734003"),
}),
dup2,
dup3,
set_field({
dest: "nwparser.result",
value: constant("Session Attribute assignment"),
}),
dup4,
dup5,
]),
});
var select67 = linear_select([
all68,
all69,
all70,
all71,
]);
var msg271 = match({
id: "MESSAGE#771:611315",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("611315"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg272 = match({
id: "MESSAGE#838:709005",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup37,
set_field({
dest: "nwparser.msg_id1",
value: constant("709005"),
}),
dup38,
dup39,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg273 = match({
id: "MESSAGE#37:105020",
dissect: {
tokenizer: "(%{context->})%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup75,
set_field({
dest: "nwparser.msg_id1",
value: constant("105020"),
}),
dup38,
dup39,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg274 = match({
id: "MESSAGE#474:338004/4",
dissect: {
tokenizer: "ed blacklisted %{protocol->} traffic from %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->}), destination %{fld1->} resolved from %{fld2->} list:%{fld3->} /%{p4->}",
field: "nwparser.p3",
},
});
var msg275 = match({
id: "MESSAGE#474:338004/6",
dissect: {
tokenizer: "%{mask->}, threat-level: %{p5->}",
field: "nwparser.p4",
},
});
var msg276 = match({
id: "MESSAGE#474:338004/6",
dissect: {
tokenizer: "%{mask->} threat-level: %{p5->}",
field: "nwparser.p4",
},
});
var select68 = linear_select([
msg275,
msg276,
]);
var msg277 = match({
id: "MESSAGE#474:338004/6",
dissect: {
tokenizer: "%{severity->}, category: %{result->}",
field: "nwparser.p5",
},
});
var all72 = all_match({
processors: [
dup183,
dup184,
dup213,
dup214,
msg274,
select68,
msg277,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("338004"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg278 = match({
id: "MESSAGE#681:502102/0",
dissect: {
tokenizer: "User deleted from local dbase: Uname: %{p0->}",
field: "nwparser.payload",
},
});
var all73 = all_match({
processors: [
msg278,
dup215,
dup216,
],
on_success: processor_chain([
set_field({
dest: "nwparser.eventcategory",
value: constant("1402020100"),
}),
set_field({
dest: "nwparser.msg_id1",
value: constant("502102"),
}),
dup17,
dup108,
dup217,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("User deleted from local DB"),
}),
]),
});
var msg279 = match({
id: "MESSAGE#706:602101/0",
dissect: {
tokenizer: "PMTU-D packet %{fld1->} byte%{p0->}",
field: "nwparser.payload",
},
});
var select69 = linear_select([
dup218,
]);
var msg280 = match({
id: "MESSAGE#706:602101/2",
dissect: {
tokenizer: "%{->}greater than effective mtu %{fld2->} dest_addr=%{daddr->}, src_addr=%{saddr->}, prot=%{protocol->}",
field: "nwparser.p1",
},
});
var all74 = all_match({
processors: [
msg279,
select69,
msg280,
],
on_success: processor_chain([
dup41,
set_field({
dest: "nwparser.msg_id1",
value: constant("602101"),
}),
dup7,
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup27,
set_field({
dest: "nwparser.event_description",
value: constant("PMTU-D packet bytes greater than effective mtu"),
}),
]),
});
var msg281 = match({
id: "MESSAGE#1254:746001",
dissect: {
tokenizer: "%{application->}: %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("746001"),
}),
dup3,
]),
});
var msg282 = match({
id: "MESSAGE#292:302013:07",
dissect: {
tokenizer: "Built inbound %{protocol->} connection %{connectionid->} for %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->})(%{domain->}\\%{fld3->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->})(%{ddomain->}\\%{c_username->}) (%{username->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302013:07"),
}),
dup64,
dup102,
dup43,
dup2,
dup3,
dup4,
dup5,
dup192,
dup193,
]),
});
var msg283 = match({
id: "MESSAGE#293:302013/2",
dissect: {
tokenizer: "to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->}) %{p2->}",
field: "nwparser.p1",
},
});
var msg284 = match({
id: "MESSAGE#293:302013/4",
dissect: {
tokenizer: "'%{username->}'%{p3->}",
field: "nwparser.p2",
},
});
var msg285 = match({
id: "MESSAGE#293:302013/4",
dissect: {
tokenizer: "(%{username->})%{p3->}",
field: "nwparser.p2",
},
});
var select70 = linear_select([
msg284,
msg285,
]);
var msg286 = match({
id: "MESSAGE#293:302013/4",
dissect: {
tokenizer: "%{->} ",
field: "nwparser.p3",
},
});
var all75 = all_match({
processors: [
dup219,
dup220,
msg283,
select70,
msg286,
],
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302013"),
}),
dup64,
dup102,
dup43,
dup2,
dup3,
dup4,
dup5,
dup192,
dup193,
]),
});
var all76 = all_match({
processors: [
dup221,
dup222,
dup223,
],
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302013:01"),
}),
dup64,
dup102,
dup43,
dup14,
dup2,
dup3,
dup4,
dup5,
dup194,
dup193,
]),
});
var msg287 = match({
id: "MESSAGE#295:302013:02/2",
dissect: {
tokenizer: "%{stransport->})(%{domain->}\\%{username->})%{p1->}",
field: "nwparser.p0",
},
});
var select71 = linear_select([
msg287,
dup224,
]);
var msg288 = match({
id: "MESSAGE#295:302013:02/2",
dissect: {
tokenizer: "%{->}to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->})",
field: "nwparser.p1",
},
});
var all77 = all_match({
processors: [
dup219,
select71,
msg288,
],
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302013:02"),
}),
dup64,
dup102,
dup43,
dup14,
dup2,
dup3,
dup4,
dup5,
dup192,
dup193,
]),
});
var msg289 = match({
id: "MESSAGE#296:302013:03/0",
dissect: {
tokenizer: "Built outbound %{protocol->} connection %{connectionid->} for %{p0->}",
field: "nwparser.payload",
},
});
var msg290 = match({
id: "MESSAGE#296:302013:03/2",
dissect: {
tokenizer: "%{dinterface->}:%{fld1->} :%{p1->}",
field: "nwparser.p0",
},
});
var msg291 = match({
id: "MESSAGE#296:302013:03/2",
dissect: {
tokenizer: "%{dinterface->} :%{p1->}",
field: "nwparser.p0",
},
});
var select72 = linear_select([
msg290,
msg291,
]);
var msg292 = match({
id: "MESSAGE#296:302013:03/2",
dissect: {
tokenizer: "%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->}) to %{p2->}",
field: "nwparser.p1",
},
});
var msg293 = match({
id: "MESSAGE#296:302013:03/4",
dissect: {
tokenizer: "%{sinterface->}:%{fld2->}:%{saddr->}/%{p3->}",
field: "nwparser.p2",
},
});
var msg294 = match({
id: "MESSAGE#296:302013:03/4",
dissect: {
tokenizer: "%{sinterface->}:%{saddr->}/%{p3->}",
field: "nwparser.p2",
},
});
var select73 = linear_select([
msg293,
msg294,
]);
var msg295 = match({
id: "MESSAGE#296:302013:03/4",
dissect: {
tokenizer: "%{sport->} (%{stransaddr->}/%{stransport->})",
field: "nwparser.p3",
},
});
var all78 = all_match({
processors: [
msg289,
select72,
msg292,
select73,
msg295,
],
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302013:03"),
}),
dup64,
dup102,
dup43,
dup14,
dup2,
dup3,
dup4,
dup5,
dup194,
dup193,
]),
});
var msg296 = match({
id: "MESSAGE#297:302013:04",
dissect: {
tokenizer: "Built inbound %{protocol->} connection %{connectionid->} for %{sinterface->} %{saddr->}/%{sport->} gaddr %{hostip->}/%{network_port->} %{dinterface->} %{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302013:04"),
}),
dup64,
dup102,
dup43,
dup14,
dup2,
dup3,
dup4,
dup5,
dup192,
dup193,
]),
});
var msg297 = match({
id: "MESSAGE#298:302013:05",
dissect: {
tokenizer: "Built outbound %{protocol->} connection %{connectionid->} for %{dinterface->} %{daddr->}/%{dport->} gaddr %{hostip->}/%{network_port->} %{sinterface->} %{saddr->}/%{sport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302013:05"),
}),
dup64,
dup102,
dup43,
dup14,
dup2,
dup3,
dup4,
dup5,
dup194,
dup193,
]),
});
var msg298 = match({
id: "MESSAGE#299:302013:06/0",
dissect: {
tokenizer: "Built outbound %{protocol->} connection %{connectionid->} for %{dinterface->} :%{daddr->}/%{dport->} (%{p0->}",
field: "nwparser.payload",
},
});
var select74 = linear_select([
dup225,
dup226,
]);
var all79 = all_match({
processors: [
msg298,
select74,
dup227,
dup228,
],
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302013:06"),
}),
dup64,
dup102,
dup43,
dup14,
dup2,
dup3,
dup4,
dup5,
dup194,
dup193,
]),
});
var msg299 = match({
id: "MESSAGE#300:302013:09",
dissect: {
tokenizer: "Built inbound %{protocol->} connection %{connectionid->} for %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->})(%{domain->}\\%{username->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302013:09"),
}),
dup64,
dup102,
dup43,
dup14,
dup3,
dup4,
dup5,
dup192,
dup193,
]),
});
var msg300 = match({
id: "MESSAGE#301:302013:08",
dissect: {
tokenizer: "Built inbound %{protocol->} connection %{connectionid->} for %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->})(%{fld->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302013:08"),
}),
dup64,
dup102,
dup43,
dup14,
dup3,
dup4,
dup5,
dup192,
dup193,
]),
});
var select75 = linear_select([
msg282,
all75,
all76,
all77,
all78,
msg296,
msg297,
all79,
msg299,
msg300,
]);
var msg301 = match({
id: "MESSAGE#361:304009",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("304009"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg302 = match({
id: "MESSAGE#614:409012",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("409012"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg303 = match({
id: "MESSAGE#638:415006",
dissect: {
tokenizer: "%{sigid->} Content size %{priority->} out of range - %{listnum->} %{protocol->} from %{saddr->} to %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup206,
set_field({
dest: "nwparser.msg_id1",
value: constant("415006"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.context",
value: constant("Content size out of range"),
}),
]),
});
var msg304 = match({
id: "MESSAGE#159:110001",
dissect: {
tokenizer: "No route to %{daddr->} from %{saddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup229,
set_field({
dest: "nwparser.msg_id1",
value: constant("110001"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg305 = match({
id: "MESSAGE#472:338002/4",
dissect: {
tokenizer: "ed blacklisted %{protocol->} traffic from %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->}), destination %{fld1->} resolved from %{fld2->} list:%{web_domain->} threat-level: %{severity->}, category: %{result->}",
field: "nwparser.p3",
},
});
var all80 = all_match({
processors: [
dup183,
dup184,
dup213,
dup214,
msg305,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("338002"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg306 = match({
id: "MESSAGE#1287:113034/2",
dissect: {
tokenizer: "%{hostip->}> User ACL \u003c\u003c%{info->}> from AAA ignored, AV-PAIR ACL used instead",
field: "nwparser.p1",
},
});
var all81 = all_match({
processors: [
dup77,
dup78,
msg306,
],
on_success: processor_chain([
dup24,
set_field({
dest: "nwparser.msg_id1",
value: constant("113034"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("specified ACL was not used because a Cisco AV-PAIR ACL was used"),
}),
]),
});
var msg307 = match({
id: "MESSAGE#484:338202/4",
dissect: {
tokenizer: "ed greylisted %{protocol->} traffic from %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->}), destination %{fld1->} resolved from %{fld2->} list:%{web_domain->} threat-level: %{severity->}, category: %{result->}",
field: "nwparser.p3",
},
});
var all82 = all_match({
processors: [
dup183,
dup184,
dup230,
dup214,
msg307,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("338202"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg308 = match({
id: "MESSAGE#889:713123:01",
dissect: {
tokenizer: "Group = %{group->}, Username = %{username->}, IP = %{saddr->}, IKE lost contact with remote peer, deleting connection (keepalive type: %{fld1->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("713123:01"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
dup231,
]),
});
var msg309 = match({
id: "MESSAGE#890:713123",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, IKE lost contact with remote peer, deleting connection (keepalive type: %{fld1->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("713123"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
dup231,
]),
});
var select76 = linear_select([
msg308,
msg309,
]);
var msg310 = match({
id: "MESSAGE#1068:717007",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("717007"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg311 = match({
id: "MESSAGE#1112:720003",
dissect: {
tokenizer: "(VPN-%{context->}) %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("720003"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg312 = match({
id: "MESSAGE#51:105042",
dissect: {
tokenizer: "(%{context->}) %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup37,
set_field({
dest: "nwparser.msg_id1",
value: constant("105042"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg313 = match({
id: "MESSAGE#862:713041/2",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->} , IKE Initiator: %{p1->}",
field: "nwparser.p0",
},
});
var msg314 = match({
id: "MESSAGE#862:713041/2",
dissect: {
tokenizer: "Username = '%{username->}', IP = %{saddr->} , IKE Initiator: %{p1->}",
field: "nwparser.p0",
},
});
var msg315 = match({
id: "MESSAGE#862:713041/2",
dissect: {
tokenizer: "Username = %{username->}, IP = %{saddr->} , IKE Initiator: %{p1->}",
field: "nwparser.p0",
},
});
var msg316 = match({
id: "MESSAGE#862:713041/2",
dissect: {
tokenizer: "IP = %{saddr->} , IKE Initiator: %{p1->}",
field: "nwparser.p0",
},
});
var select77 = linear_select([
msg313,
msg314,
msg315,
msg316,
]);
var msg317 = match({
id: "MESSAGE#862:713041/3",
dissect: {
tokenizer: "Rekeying%{p2->}",
field: "nwparser.p1",
},
});
var msg318 = match({
id: "MESSAGE#862:713041/3",
dissect: {
tokenizer: "New%{p2->}",
field: "nwparser.p1",
},
});
var select78 = linear_select([
msg317,
msg318,
]);
var msg319 = match({
id: "MESSAGE#862:713041/3",
dissect: {
tokenizer: "%{->}Phase %{p3->}",
field: "nwparser.p2",
},
});
var msg320 = match({
id: "MESSAGE#862:713041/5",
dissect: {
tokenizer: "1%{p4->}",
field: "nwparser.p3",
},
});
var msg321 = match({
id: "MESSAGE#862:713041/5",
dissect: {
tokenizer: "2%{p4->}",
field: "nwparser.p3",
},
});
var select79 = linear_select([
msg320,
msg321,
]);
var msg322 = match({
id: "MESSAGE#862:713041/5",
dissect: {
tokenizer: "%{->}, Intf %{fld1->}, IKE Peer %{fld2->} %{info->}",
field: "nwparser.p4",
},
});
var all83 = all_match({
processors: [
dup44,
select77,
select78,
msg319,
select79,
msg322,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("713041"),
}),
dup7,
dup11,
dup12,
dup13,
dup2,
dup3,
dup4,
dup5,
dup232,
]),
});
var msg323 = match({
id: "MESSAGE#863:713041:01/0",
dissect: {
tokenizer: "IKE Initiator: %{p0->}",
field: "nwparser.payload",
},
});
var msg324 = match({
id: "MESSAGE#863:713041:01/2",
dissect: {
tokenizer: "Rekeying%{p1->}",
field: "nwparser.p0",
},
});
var msg325 = match({
id: "MESSAGE#863:713041:01/2",
dissect: {
tokenizer: "New%{p1->}",
field: "nwparser.p0",
},
});
var select80 = linear_select([
msg324,
msg325,
]);
var msg326 = match({
id: "MESSAGE#863:713041:01/2",
dissect: {
tokenizer: "%{->}Phase 2, Intf %{fld1->}, IKE Peer %{fld2->} %{info->}",
field: "nwparser.p1",
},
});
var all84 = all_match({
processors: [
msg323,
select80,
msg326,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("713041:01"),
}),
dup7,
dup11,
dup12,
dup13,
dup14,
dup2,
dup3,
dup4,
dup5,
dup232,
]),
});
var select81 = linear_select([
all83,
all84,
]);
var msg327 = match({
id: "MESSAGE#1107:718068",
dissect: {
tokenizer: "Start VPN Load Balancing in context %{context->}.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("718068"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Start VPN Load Balancing"),
}),
]),
});
var msg328 = match({
id: "MESSAGE#1311:434002",
dissect: {
tokenizer: "SFR requested to drop %{protocol->} packet from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("434002"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("SFR requested to drop packet"),
}),
]),
});
var msg329 = match({
id: "MESSAGE#1231:737006",
dissect: {
tokenizer: "%{process->}: Local pool request succeeded for tunnel-group '%{info->}'",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("737006"),
}),
dup2,
dup3,
dup233,
dup4,
dup5,
]),
});
var msg330 = match({
id: "MESSAGE#1232:737006:01",
dissect: {
tokenizer: "%{process->}: Session=%{sessionid->}, Local pool request succeeded for tunnel-group '%{info->}'",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("737006:01"),
}),
dup2,
dup3,
dup233,
dup4,
dup5,
]),
});
var select82 = linear_select([
msg329,
msg330,
]);
var msg331 = match({
id: "MESSAGE#376:305009",
dissect: {
tokenizer: "Built %{context->} translation from %{sinterface->}:%{saddr->} to %{dinterface->}:%{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305009"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup234,
]),
});
var msg332 = match({
id: "MESSAGE#634:415003",
dissect: {
tokenizer: "%{sigid->} HTTP Peer-to-Peer detected - %{listnum->} %{protocol->} from %{saddr->} to %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup206,
set_field({
dest: "nwparser.msg_id1",
value: constant("415003"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.context",
value: constant("HTTP Peer-to-Peer detected"),
}),
]),
});
var msg333 = match({
id: "MESSAGE#726:603107/0",
dissect: {
tokenizer: "L2TP Tunnel deleted%{p0->}",
field: "nwparser.payload",
},
});
var msg334 = match({
id: "MESSAGE#726:603107/2",
dissect: {
tokenizer: "%{->}tunnel_id = %{fld1->} remote_peer_ip =%{saddr->}",
field: "nwparser.p1",
},
});
var all85 = all_match({
processors: [
msg333,
dup235,
msg334,
],
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("603107"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("L2TP tunnel deleted"),
}),
]),
});
var msg335 = match({
id: "MESSAGE#1158:722012/2",
dissect: {
tokenizer: "%{saddr->}> SVC Message: %{info->}/NOTICE: %{p2->}",
field: "nwparser.p1",
},
});
var msg336 = match({
id: "MESSAGE#1158:722012/3",
dissect: {
tokenizer: "%{event_description->}(%{fld1->}) ",
field: "nwparser.p2",
},
});
var msg337 = match({
id: "MESSAGE#1158:722012/3",
dissect: {
tokenizer: "%{->} %{event_description->}",
field: "nwparser.p2",
},
});
var select83 = linear_select([
msg336,
msg337,
]);
var all86 = all_match({
processors: [
dup77,
dup78,
msg335,
select83,
],
on_success: processor_chain([
dup55,
set_field({
dest: "nwparser.msg_id1",
value: constant("722012"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg338 = match({
id: "MESSAGE#152:109027/0",
dissect: {
tokenizer: "[%{protocol->}] Unable to dec%{p0->}",
field: "nwparser.payload",
},
});
var msg339 = match({
id: "MESSAGE#152:109027/2",
dissect: {
tokenizer: "y%{p1->}",
field: "nwparser.p0",
},
});
var select84 = linear_select([
dup236,
msg339,
]);
var msg340 = match({
id: "MESSAGE#152:109027/2",
dissect: {
tokenizer: "pher response message Server = %{hostip->}, User = %{p2->}",
field: "nwparser.p1",
},
});
var all87 = all_match({
processors: [
msg338,
select84,
msg340,
dup237,
],
on_success: processor_chain([
dup86,
set_field({
dest: "nwparser.msg_id1",
value: constant("109027"),
}),
dup17,
dup18,
dup87,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg341 = match({
id: "MESSAGE#189:113012/0",
dissect: {
tokenizer: "AAA user authentication Successful : local database : user = %{p0->}",
field: "nwparser.payload",
},
});
var all88 = all_match({
processors: [
msg341,
dup238,
],
on_success: processor_chain([
dup63,
set_field({
dest: "nwparser.msg_id1",
value: constant("113012"),
}),
dup17,
dup18,
dup40,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("AAA user authentication successful"),
}),
]),
});
var msg342 = match({
id: "MESSAGE#595:406001",
dissect: {
tokenizer: "FTP port command low port: %{saddr->}/%{sport->} to %{daddr->} on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup239,
set_field({
dest: "nwparser.msg_id1",
value: constant("406001"),
}),
dup2,
dup3,
dup4,
dup5,
dup240,
]),
});
var all89 = all_match({
processors: [
dup22,
dup23,
dup241,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("715059"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg343 = match({
id: "MESSAGE#1032:715059:01",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{action->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("715059:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var select85 = linear_select([
all89,
msg343,
]);
var all90 = all_match({
processors: [
dup9,
dup242,
dup243,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("713024"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg344 = match({
id: "MESSAGE#876:713073",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, Responder forcing change of %{ike->} rekeying duration from %{fld1->} to %{fld2->} seconds",
field: "nwparser.payload",
},
on_success: processor_chain([
dup244,
set_field({
dest: "nwparser.msg_id1",
value: constant("713073"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
dup245,
]),
});
var msg345 = match({
id: "MESSAGE#1053:716039/0",
dissect: {
tokenizer: "Authentication: %{action->}, group = \u003c\u003c%{group->}> user = %{p0->}",
field: "nwparser.payload",
},
});
var msg346 = match({
id: "MESSAGE#1053:716039/2",
dissect: {
tokenizer: "\u003c\u003c%{username->}> IP = \u003c\u003c %{p1->}",
field: "nwparser.p0",
},
});
var msg347 = match({
id: "MESSAGE#1053:716039/2",
dissect: {
tokenizer: "'%{username->}' IP = \u003c\u003c %{p1->}",
field: "nwparser.p0",
},
});
var msg348 = match({
id: "MESSAGE#1053:716039/2",
dissect: {
tokenizer: "%{username->} IP = \u003c\u003c %{p1->}",
field: "nwparser.p0",
},
});
var select86 = linear_select([
msg346,
msg347,
msg348,
]);
var msg349 = match({
id: "MESSAGE#1053:716039/3",
dissect: {
tokenizer: "%{saddr->} (%{info->}) >, Session Type: %{p2->}",
field: "nwparser.p1",
},
});
var msg350 = match({
id: "MESSAGE#1053:716039/3",
dissect: {
tokenizer: "%{saddr->} >, Session Type: %{p2->}",
field: "nwparser.p1",
},
});
var select87 = linear_select([
msg349,
msg350,
]);
var msg351 = match({
id: "MESSAGE#1053:716039/3",
dissect: {
tokenizer: "%{network_service->}",
field: "nwparser.p2",
},
});
var all91 = all_match({
processors: [
msg345,
select86,
select87,
msg351,
],
on_success: processor_chain([
dup171,
set_field({
dest: "nwparser.msg_id1",
value: constant("716039"),
}),
dup18,
dup17,
dup99,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg352 = match({
id: "MESSAGE#1054:716039:01/0",
dissect: {
tokenizer: "Group \u003c\u003c %{group->}> User %{p0->}",
field: "nwparser.payload",
},
});
var msg353 = match({
id: "MESSAGE#1054:716039:01/3",
dissect: {
tokenizer: "%{saddr->} (%{info->}) > Authentication:%{p2->}",
field: "nwparser.p1",
},
});
var msg354 = match({
id: "MESSAGE#1054:716039:01/3",
dissect: {
tokenizer: "%{saddr->} > Authentication:%{p2->}",
field: "nwparser.p1",
},
});
var select88 = linear_select([
msg353,
msg354,
]);
var msg355 = match({
id: "MESSAGE#1054:716039:01/3",
dissect: {
tokenizer: "%{result->} Session Type: %{network_service->}",
field: "nwparser.p2",
},
});
var all92 = all_match({
processors: [
msg352,
dup182,
select88,
msg355,
],
on_success: processor_chain([
dup171,
set_field({
dest: "nwparser.msg_id1",
value: constant("716039:01"),
}),
dup18,
dup17,
dup106,
dup19,
dup14,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Session connection rejected"),
}),
]),
});
var select89 = linear_select([
all91,
all92,
]);
var msg356 = match({
id: "MESSAGE#363:305002",
dissect: {
tokenizer: "Translation built for gaddr %{hostip->} to laddr %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305002"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Translation built"),
}),
]),
});
var msg357 = match({
id: "MESSAGE#722:603103",
dissect: {
tokenizer: "PPP virtual interface %{interface->} - user: %{username->} aaa authentication %{disposition->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup83,
set_field({
dest: "nwparser.msg_id1",
value: constant("603103"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg358 = match({
id: "MESSAGE#768:611312",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("611312"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var all93 = all_match({
processors: [
dup246,
dup247,
dup132,
],
on_success: processor_chain([
dup55,
set_field({
dest: "nwparser.msg_id1",
value: constant("702204:01"),
}),
dup7,
dup14,
dup4,
dup5,
dup2,
dup3,
dup248,
]),
});
var all94 = all_match({
processors: [
dup246,
dup247,
dup130,
],
on_success: processor_chain([
dup55,
set_field({
dest: "nwparser.msg_id1",
value: constant("702204"),
}),
dup7,
dup4,
dup5,
dup2,
dup3,
dup248,
]),
});
var select90 = linear_select([
all93,
all94,
]);
var msg359 = match({
id: "MESSAGE#103:106101",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("106101"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg360 = match({
id: "MESSAGE#439:320001",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup160,
set_field({
dest: "nwparser.msg_id1",
value: constant("320001"),
}),
dup7,
dup18,
dup17,
dup106,
dup19,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg361 = match({
id: "MESSAGE#548:400051",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
set_field({
dest: "nwparser.eventcategory",
value: constant("1001020205"),
}),
set_field({
dest: "nwparser.msg_id1",
value: constant("400051"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg362 = match({
id: "MESSAGE#1182:724002",
dissect: {
tokenizer: "Group \u003c\u003c%{group->}> User \u003c\u003c%{username->}> IP \u003c\u003c%{hostip->}> %{event_description->}. %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("724002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg363 = match({
id: "MESSAGE#514:400017",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup26,
set_field({
dest: "nwparser.msg_id1",
value: constant("400017"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg364 = match({
id: "MESSAGE#644:415011",
dissect: {
tokenizer: "%{sigid->} HTTP URL Length exceeded. Received %{priority->} byte URL - %{listnum->} URI length exceeded from %{saddr->} to %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup206,
set_field({
dest: "nwparser.msg_id1",
value: constant("415011"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.context",
value: constant("HTTP URL Length exceeded"),
}),
]),
});
var msg365 = match({
id: "MESSAGE#786:614001",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup58,
set_field({
dest: "nwparser.msg_id1",
value: constant("614001"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg366 = match({
id: "MESSAGE#1187:725002/0",
dissect: {
tokenizer: "Device completed SSL handshake with %{p0->}",
field: "nwparser.payload",
},
});
var msg367 = match({
id: "MESSAGE#1187:725002/3",
dissect: {
tokenizer: "%{fld1->}_%{fld2->}_%{saddr->}/%{sport->} to %{daddr->}/%{dport->} for %{version->} session ",
field: "nwparser.p2",
},
});
var msg368 = match({
id: "MESSAGE#1187:725002/3",
dissect: {
tokenizer: "%{saddr->}/%{sport->} to %{daddr->}/%{dport->} for %{version->} session ",
field: "nwparser.p2",
},
});
var msg369 = match({
id: "MESSAGE#1187:725002/3",
dissect: {
tokenizer: "%{hostip->}/%{network_port->}",
field: "nwparser.p2",
},
});
var select91 = linear_select([
msg367,
msg368,
msg369,
]);
var all95 = all_match({
processors: [
msg366,
dup92,
dup249,
select91,
],
on_success: processor_chain([
dup250,
set_field({
dest: "nwparser.msg_id1",
value: constant("725002"),
}),
dup11,
dup43,
dup40,
dup2,
dup35,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Device completed SSL handshake"),
}),
]),
});
var msg370 = match({
id: "MESSAGE#219:201004:01/0",
dissect: {
tokenizer: "Too many %{protocol->} connections on %{p0->}",
field: "nwparser.payload",
},
});
var msg371 = match({
id: "MESSAGE#219:201004:01/2",
dissect: {
tokenizer: "%{->} %{hostip->}! %{fld1->}",
field: "nwparser.p1",
},
});
var all96 = all_match({
processors: [
msg370,
dup251,
msg371,
],
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("201004:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg372 = match({
id: "MESSAGE#220:201004",
dissect: {
tokenizer: "Too many embryonic connections on STRING %{hostip->} %{fld1->}/%{fld2->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("201004"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var select92 = linear_select([
all96,
msg372,
]);
var msg373 = match({
id: "MESSAGE#415:315003/0",
dissect: {
tokenizer: "SSH login session failed from %{saddr->} on (%{fld1->} attempts) on interface %{interface->} by user %{p0->}",
field: "nwparser.payload",
},
});
var all97 = all_match({
processors: [
msg373,
dup238,
],
on_success: processor_chain([
dup84,
set_field({
dest: "nwparser.msg_id1",
value: constant("315003"),
}),
dup2,
dup3,
dup4,
dup5,
dup252,
]),
});
var msg374 = match({
id: "MESSAGE#416:315003:01/0",
dissect: {
tokenizer: "SSH login session failed from %{saddr->}(%{fld1->} attempts) on interface %{interface->} by user %{p0->}",
field: "nwparser.payload",
},
});
var all98 = all_match({
processors: [
msg374,
dup187,
],
on_success: processor_chain([
dup84,
set_field({
dest: "nwparser.msg_id1",
value: constant("315003:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
dup252,
]),
});
var select93 = linear_select([
all97,
all98,
]);
var msg375 = match({
id: "MESSAGE#449:323001",
dissect: {
tokenizer: "Module in slot %{fld1->} experienced a control channel communication failure",
field: "nwparser.payload",
},
on_success: processor_chain([
dup49,
set_field({
dest: "nwparser.msg_id1",
value: constant("323001"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg376 = match({
id: "MESSAGE#453:324000/0",
dissect: {
tokenizer: "Drop GTP%{p0->}",
field: "nwparser.payload",
},
});
var msg377 = match({
id: "MESSAGE#453:324000/2",
dissect: {
tokenizer: "v%{p1->}",
field: "nwparser.p0",
},
});
var select94 = linear_select([
msg377,
]);
var msg378 = match({
id: "MESSAGE#453:324000/2",
dissect: {
tokenizer: "%{->} %{misc->} message %{fld1->} from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->} Reason: %{result->}",
field: "nwparser.p1",
},
});
var all99 = all_match({
processors: [
msg376,
select94,
msg378,
],
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("324000"),
}),
dup42,
dup43,
dup19,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Drop GTPv"),
}),
]),
});
var msg379 = match({
id: "MESSAGE#1273:752010",
dissect: {
tokenizer: "IKEv2 Doesn't have a proposal specified%{->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("752010"),
}),
dup4,
dup5,
dup2,
dup3,
]),
});
var msg380 = match({
id: "MESSAGE#1310:747016",
dissect: {
tokenizer: "Clustering: Found a split cluster with both %{fld1->} and %{fld2->} as master units. Master role retained by %{fld3->}, %{fld4->} will leave then join as a slave",
field: "nwparser.payload",
},
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("747016"),
}),
dup2,
dup3,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Found a split cluster"),
}),
]),
});
var msg381 = match({
id: "MESSAGE#754:611102/0",
dissect: {
tokenizer: "User authentication failed: Uname: %{p0->}",
field: "nwparser.payload",
},
});
var all100 = all_match({
processors: [
msg381,
dup238,
],
on_success: processor_chain([
dup84,
set_field({
dest: "nwparser.msg_id1",
value: constant("611102"),
}),
dup7,
dup18,
dup17,
dup106,
dup19,
dup2,
dup3,
dup4,
dup5,
dup253,
]),
});
var msg382 = match({
id: "MESSAGE#1299:611102:01/0",
dissect: {
tokenizer: "User authentication failed: IP address: %{p0->}",
field: "nwparser.payload",
},
});
var msg383 = match({
id: "MESSAGE#1299:611102:01/1",
dissect: {
tokenizer: "%{saddr->}, Uname: %{username->}",
field: "nwparser.p0",
},
});
var msg384 = match({
id: "MESSAGE#1299:611102:01/1",
dissect: {
tokenizer: "%{saddr->}",
field: "nwparser.p0",
},
});
var select95 = linear_select([
msg383,
msg384,
]);
var all101 = all_match({
processors: [
msg382,
select95,
],
on_success: processor_chain([
dup84,
set_field({
dest: "nwparser.msg_id1",
value: constant("611102:01"),
}),
dup7,
dup18,
dup17,
dup106,
dup19,
dup2,
dup3,
dup4,
dup5,
dup253,
]),
});
var select96 = linear_select([
all100,
all101,
]);
var msg385 = match({
id: "MESSAGE#1198:725010/0",
dissect: {
tokenizer: "Device supports the following %{fld1->} cipher(s)%{p0->}",
field: "nwparser.payload",
},
});
var all102 = all_match({
processors: [
msg385,
dup254,
dup255,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("725010"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg386 = match({
id: "MESSAGE#119:108005:01",
dissect: {
tokenizer: "Out of SMTP connections! %{saddr->}/%{sport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("108005:01"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Out of SMTP connections"),
}),
]),
});
var msg387 = match({
id: "MESSAGE#120:108005",
dissect: {
tokenizer: "%{network_service->}: Received ESMTP Request from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}; %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup256,
set_field({
dest: "nwparser.msg_id1",
value: constant("108005"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Received ESMTP request"),
}),
]),
});
var select97 = linear_select([
msg386,
msg387,
]);
var msg388 = match({
id: "MESSAGE#432:318005",
dissect: {
tokenizer: "lsid %{fld1->} adv %{fld2->} type %{fld3->} gateway %{fld4->} metric %{fld5->} network %{fld6->} mask %{fld7->} protocol %{protocol->} attr %{fld8->} net-metric %{fld9->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("318005"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg389 = match({
id: "MESSAGE#546:400049",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup74,
set_field({
dest: "nwparser.msg_id1",
value: constant("400049"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg390 = match({
id: "MESSAGE#649:418001:02",
dissect: {
tokenizer: "Through-the-device packet to/from management-only network is denied: icmp src %{sinterface->}:%{saddr->} dst %{dinterface->}:%{daddr->} (type %{icmptype->}, code %{icmpcode->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("418001:02"),
}),
dup42,
dup43,
dup19,
dup14,
dup2,
dup3,
dup4,
dup5,
dup257,
dup258,
dup259,
]),
});
var msg391 = match({
id: "MESSAGE#650:418001:03",
dissect: {
tokenizer: "Through-the-device packet to/from management-only network is denied: protocol %{protocol->} src %{sinterface->}:%{saddr->} dst %{dinterface->}:%{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("418001:03"),
}),
dup42,
dup43,
dup19,
dup14,
dup2,
dup3,
dup4,
dup5,
dup257,
dup258,
]),
});
var msg392 = match({
id: "MESSAGE#651:418001:01/0",
dissect: {
tokenizer: "Through-the-device packet to/from management-only network is denied: %{protocol->} src %{p0->}",
field: "nwparser.payload",
},
});
var msg393 = match({
id: "MESSAGE#651:418001:01/2",
dissect: {
tokenizer: "%{sinterface->}:%{saddr->}/%{sport->} (%{domain->}\\%{username->}) dst %{p1->}",
field: "nwparser.p0",
},
});
var msg394 = match({
id: "MESSAGE#651:418001:01/2",
dissect: {
tokenizer: "%{sinterface->}:%{saddr->}/%{sport->} dst %{p1->}",
field: "nwparser.p0",
},
});
var select98 = linear_select([
msg393,
msg394,
]);
var all103 = all_match({
processors: [
msg392,
select98,
dup260,
],
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("418001:01"),
}),
dup42,
dup43,
dup19,
dup14,
dup2,
dup3,
dup4,
dup5,
dup261,
dup258,
]),
});
var msg395 = match({
id: "MESSAGE#652:418001",
dissect: {
tokenizer: "Through-the-device packet to/from management-only network is denied: %{protocol->} from %{sinterface->} %{saddr->} (%{sport->}) to %{dinterface->} %{daddr->} (%{dport->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("418001"),
}),
dup42,
dup43,
dup19,
dup2,
dup3,
dup4,
dup5,
dup261,
dup258,
]),
});
var select99 = linear_select([
msg390,
msg391,
all103,
msg395,
]);
var msg396 = match({
id: "MESSAGE#64:106007",
dissect: {
tokenizer: "Deny %{direction->} %{protocol->} from %{saddr->}/%{sport->} to %{daddr->}/%{dport->} due to DNS %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("106007"),
}),
dup99,
dup102,
dup43,
dup2,
dup3,
dup4,
dup5,
dup27,
dup196,
]),
});
var msg397 = match({
id: "MESSAGE#392:307002",
dissect: {
tokenizer: "%{result->} session from %{saddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup105,
set_field({
dest: "nwparser.msg_id1",
value: constant("307002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg398 = match({
id: "MESSAGE#417:315004/0",
dissect: {
tokenizer: "Fail to establish SSH session because%{p0->}",
field: "nwparser.payload",
},
});
var msg399 = match({
id: "MESSAGE#417:315004/1",
dissect: {
tokenizer: "%{->}PIX RSA host key retrieval failed.",
field: "nwparser.p0",
},
});
var msg400 = match({
id: "MESSAGE#417:315004/1",
dissect: {
tokenizer: "%{space->}RSA host key retrieval failed.",
field: "nwparser.p0",
},
});
var select100 = linear_select([
msg399,
msg400,
]);
var all104 = all_match({
processors: [
msg398,
select100,
],
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("315004"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg401 = match({
id: "MESSAGE#1006:715034",
dissect: {
tokenizer: "IP = %{saddr->}, %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("715034"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg402 = match({
id: "MESSAGE#174:111010/2",
dissect: {
tokenizer: "'%{username->}' , running '%{p1->}",
field: "nwparser.p0",
},
});
var msg403 = match({
id: "MESSAGE#174:111010/2",
dissect: {
tokenizer: "%{username->} , running '%{p1->}",
field: "nwparser.p0",
},
});
var select101 = linear_select([
msg402,
msg403,
]);
var msg404 = match({
id: "MESSAGE#174:111010/2",
dissect: {
tokenizer: "%{fld1->}' from IP %{saddr->}, executed '%{action->}'",
field: "nwparser.p1",
},
});
var all105 = all_match({
processors: [
dup262,
select101,
msg404,
],
on_success: processor_chain([
dup263,
set_field({
dest: "nwparser.msg_id1",
value: constant("111010"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("User executed cmd"),
}),
]),
});
var msg405 = match({
id: "MESSAGE#682:502103/0",
dissect: {
tokenizer: "User priv level changed: Uname: %{p0->}",
field: "nwparser.payload",
},
});
var msg406 = match({
id: "MESSAGE#682:502103/2",
dissect: {
tokenizer: "'%{username->}' From: %{p1->}",
field: "nwparser.p0",
},
});
var msg407 = match({
id: "MESSAGE#682:502103/2",
dissect: {
tokenizer: "%{username->} From: %{p1->}",
field: "nwparser.p0",
},
});
var select102 = linear_select([
msg406,
msg407,
]);
var msg408 = match({
id: "MESSAGE#682:502103/2",
dissect: {
tokenizer: "%{fld1->} To: %{fld2->}",
field: "nwparser.p1",
},
});
var all106 = all_match({
processors: [
msg405,
select102,
msg408,
],
on_success: processor_chain([
set_field({
dest: "nwparser.eventcategory",
value: constant("1402020300"),
}),
set_field({
dest: "nwparser.msg_id1",
value: constant("502103"),
}),
dup17,
dup13,
dup217,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("User priv level change"),
}),
]),
});
var msg409 = match({
id: "MESSAGE#1313:199015",
dissect: {
tokenizer: "%{fld1->} %{fld2->} %{fld3->}:%{fld4->}:%{fld5->} %{saddr->} %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup264,
set_field({
dest: "nwparser.msg_id1",
value: constant("199015"),
}),
dup3,
dup4,
dup5,
]),
});
var msg410 = match({
id: "MESSAGE#47:105038",
dissect: {
tokenizer: "(%{context->}) %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup75,
set_field({
dest: "nwparser.msg_id1",
value: constant("105038"),
}),
dup38,
dup39,
dup87,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg411 = match({
id: "MESSAGE#486:338204/2",
dissect: {
tokenizer: "ilter dropped greylisted %{protocol->} traffic from %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->}), destination %{fld1->} resolved from %{fld2->} list:%{web_domain->} threat-level: %{severity->}, category: %{result->}",
field: "nwparser.p1",
},
});
var all107 = all_match({
processors: [
dup183,
dup184,
msg411,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("338204"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg412 = match({
id: "MESSAGE#732:604104",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup58,
set_field({
dest: "nwparser.msg_id1",
value: constant("604104"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg413 = match({
id: "MESSAGE#1243:737017/2",
dissect: {
tokenizer: "%{->}DHCP request attempt %{dclass_counter1->} succeeded",
field: "nwparser.p1",
},
});
var all108 = all_match({
processors: [
dup53,
dup265,
msg413,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("737017"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("DHCP request attempt succeeded"),
}),
]),
});
var msg414 = match({
id: "MESSAGE#575:403107",
dissect: {
tokenizer: "PPP virtual interface %{interface->} missing aaa server group info",
field: "nwparser.payload",
},
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("403107"),
}),
dup38,
dup39,
dup87,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg415 = match({
id: "MESSAGE#625:411005/2",
dissect: {
tokenizer: "nterface %{interface->} experienced a hardware transmit hang. %{result->}.",
field: "nwparser.p1",
},
});
var all109 = all_match({
processors: [
dup44,
dup266,
msg415,
],
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("411005"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.misc",
value: constant("Interface experienced a hardware transmit hang"),
}),
]),
});
var msg416 = match({
id: "MESSAGE#907:713145",
dissect: {
tokenizer: "Group = %{group->}, Username = %{username->}, IP = %{saddr->}, Detected Hardware Client in network extension mode, %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("713145"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Detected Hardware Client in network extension mode"),
}),
]),
});
var msg417 = match({
id: "MESSAGE#1269:751014",
dissect: {
tokenizer: "Local:%{saddr->}:%{sport->} Remote:%{daddr->}:%{dport->} Username:%{username->} %{severity->} Configuration Payload request for attribute %{obj_name->} could not be processed. Error: %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("751014"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Configuration Payload request for attribute could not be processed"),
}),
]),
});
var msg418 = match({
id: "MESSAGE#426:317004",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("317004"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg419 = match({
id: "MESSAGE#1163:722027/4",
dissect: {
tokenizer: "SVC decompression history reset%{->}",
field: "nwparser.p3",
},
});
var all110 = all_match({
processors: [
dup77,
dup182,
dup267,
dup268,
msg419,
],
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("722027"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg420 = match({
id: "MESSAGE#761:611305",
dissect: {
tokenizer: "VPNClient: DHCP Policy installed:%{->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup126,
set_field({
dest: "nwparser.msg_id1",
value: constant("611305"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
dup269,
]),
});
var msg421 = match({
id: "MESSAGE#1225:735011",
dissect: {
tokenizer: "Power Supply %{dclass_counter1->}: Fan OK",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("735011"),
}),
dup4,
dup5,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("Power Supply Fan OK"),
}),
]),
});
var msg422 = match({
id: "MESSAGE#1285:746014",
dissect: {
tokenizer: "user-identity: [FQDN] %{domain->} address %{hostip->} obsolete",
field: "nwparser.payload",
},
on_success: processor_chain([
dup24,
set_field({
dest: "nwparser.msg_id1",
value: constant("746014"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg423 = match({
id: "MESSAGE#836:709003",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup37,
set_field({
dest: "nwparser.msg_id1",
value: constant("709003"),
}),
dup38,
dup39,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg424 = match({
id: "MESSAGE#895:713129",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{action->} payload type: %{fld1->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup55,
set_field({
dest: "nwparser.msg_id1",
value: constant("713129"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg425 = match({
id: "MESSAGE#1161:722023/4",
dissect: {
tokenizer: "SVC connection terminated with%{p4->}",
field: "nwparser.p3",
},
});
var msg426 = match({
id: "MESSAGE#1161:722023/6",
dissect: {
tokenizer: "%{->}compression",
field: "nwparser.p5",
},
});
var all111 = all_match({
processors: [
dup77,
dup182,
dup267,
dup268,
msg425,
dup270,
msg426,
],
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("722023"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg427 = match({
id: "MESSAGE#1214:734001/2",
dissect: {
tokenizer: "%{hostip->}, %{result->}",
field: "nwparser.p1",
},
});
var all112 = all_match({
processors: [
dup211,
dup212,
msg427,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("734001"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg428 = match({
id: "MESSAGE#254:212001",
dissect: {
tokenizer: "Unable to open %{protocol->} channel (UDP port %{network_port->}) on interface %{interface->}, error code = %{resultcode->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup75,
set_field({
dest: "nwparser.msg_id1",
value: constant("212001"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg429 = match({
id: "MESSAGE#787:614002",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup58,
set_field({
dest: "nwparser.msg_id1",
value: constant("614002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg430 = match({
id: "MESSAGE#847:710006",
dissect: {
tokenizer: "%{protocol->} request discarded from %{saddr->} to %{dinterface->}:%{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("710006"),
}),
dup42,
dup43,
dup99,
dup2,
dup3,
dup4,
dup5,
dup27,
dup271,
]),
});
var msg431 = match({
id: "MESSAGE#1039:715068",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup166,
set_field({
dest: "nwparser.msg_id1",
value: constant("715068"),
}),
dup7,
dup13,
dup38,
dup2,
dup3,
dup4,
dup5,
dup245,
]),
});
var msg432 = match({
id: "MESSAGE#2:101003",
dissect: {
tokenizer: "(%{context->})%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup49,
set_field({
dest: "nwparser.msg_id1",
value: constant("101003"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg433 = match({
id: "MESSAGE#142:109018/1",
dissect: {
tokenizer: "'%{listnum->}' is empty",
field: "nwparser.p0",
},
});
var msg434 = match({
id: "MESSAGE#142:109018/1",
dissect: {
tokenizer: "%{listnum->} is empty",
field: "nwparser.p0",
},
});
var select103 = linear_select([
msg433,
msg434,
]);
var all113 = all_match({
processors: [
dup96,
select103,
],
on_success: processor_chain([
dup6,
set_field({
dest: "nwparser.msg_id1",
value: constant("109018"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("ACL is empty"),
}),
]),
});
var msg435 = match({
id: "MESSAGE#695:505006",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup272,
set_field({
dest: "nwparser.msg_id1",
value: constant("505006"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var all114 = all_match({
processors: [
dup79,
dup273,
dup33,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("715021"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg436 = match({
id: "MESSAGE#96:106027/0",
dissect: {
tokenizer: "Deny %{protocol->} src %{sinterface->}:%{saddr->} dst %{dinterface->}:%{daddr->} by access-group %{p0->}",
field: "nwparser.payload",
},
});
var all115 = all_match({
processors: [
msg436,
dup274,
],
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("106027"),
}),
dup99,
dup102,
dup43,
dup2,
dup3,
dup4,
dup5,
dup275,
dup27,
]),
});
var msg437 = match({
id: "MESSAGE#385:305013/0",
dissect: {
tokenizer: "%{result->}; Connection for %{protocol->} src %{sinterface->}:%{saddr->}/%{p0->}",
field: "nwparser.payload",
},
});
var select104 = linear_select([
dup276,
dup277,
]);
var msg438 = match({
id: "MESSAGE#385:305013/2",
dissect: {
tokenizer: "%{dinterface->}:%{daddr->}/%{dport->} denied due to NAT reverse path failure",
field: "nwparser.p1",
},
});
var all116 = all_match({
processors: [
msg437,
select104,
msg438,
],
on_success: processor_chain([
dup24,
set_field({
dest: "nwparser.msg_id1",
value: constant("305013"),
}),
dup2,
dup35,
dup4,
dup5,
dup27,
dup196,
dup278,
]),
});
var msg439 = match({
id: "MESSAGE#386:305013:01",
dissect: {
tokenizer: "%{result->}; Connection for %{protocol->} src %{sinterface->}:%{saddr->} dst %{dinterface->}:%{daddr->} (type %{icmptype->}, code %{icmpcode->}) denied due to NAT reverse path failure",
field: "nwparser.payload",
},
on_success: processor_chain([
dup24,
set_field({
dest: "nwparser.msg_id1",
value: constant("305013:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
dup27,
dup196,
dup278,
]),
});
var msg440 = match({
id: "MESSAGE#388:305013:02",
dissect: {
tokenizer: "%{result->}; Connection for protocol %{protocol->} src %{sinterface->}:%{saddr->} dst %{dinterface->}:%{daddr->} denied due to NAT reverse path failure",
field: "nwparser.payload",
},
on_success: processor_chain([
dup24,
set_field({
dest: "nwparser.msg_id1",
value: constant("305013:02"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
dup27,
dup196,
dup278,
]),
});
var select105 = linear_select([
all116,
msg439,
msg440,
]);
var msg441 = match({
id: "MESSAGE#796:617004",
dissect: {
tokenizer: "GTP connection created for response from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("617004"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("GTP connection created"),
}),
]),
});
var msg442 = match({
id: "MESSAGE#905:713141",
dissect: {
tokenizer: "IP = %{saddr->}, %{event_description->}: %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("713141"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg443 = match({
id: "MESSAGE#552:401004/2",
dissect: {
tokenizer: "%{->}packet: %{saddr->} ==> %{daddr->} on interface %{interface->}",
field: "nwparser.p1",
},
});
var all117 = all_match({
processors: [
dup162,
dup279,
msg443,
],
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("401004"),
}),
dup42,
dup43,
dup19,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Packet dropped"),
}),
]),
});
var msg444 = match({
id: "MESSAGE#569:402130",
dissect: {
tokenizer: "CRYPTO: Received an ESP packet (SPI = %{dst_spi->}, sequence number= %{fld2->}) from %{saddr->} (user= %{username->}) to %{daddr->} with incorrect IPsec padding. (padding: %{fld3->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup49,
set_field({
dest: "nwparser.msg_id1",
value: constant("402130"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("Received an ESP packet with incorrect IPsec padding"),
}),
]),
});
var msg445 = match({
id: "MESSAGE#944:713235/2",
dissect: {
tokenizer: "%{saddr->}, %{event_description->}. %{fld1->}",
field: "nwparser.p1",
},
});
var all118 = all_match({
processors: [
dup22,
dup23,
msg445,
],
on_success: processor_chain([
dup50,
set_field({
dest: "nwparser.msg_id1",
value: constant("713235"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg446 = match({
id: "MESSAGE#945:713235:01",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, %{action->}. %{fld1->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup50,
set_field({
dest: "nwparser.msg_id1",
value: constant("713235:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var select106 = linear_select([
all118,
msg446,
]);
var msg447 = match({
id: "MESSAGE#1141:720055",
dissect: {
tokenizer: "(VPN-%{context->}) %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("720055"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg448 = match({
id: "MESSAGE#349:303004",
dissect: {
tokenizer: "FTP %{action->} command unsupported - failed strict inspection, %{result->} from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("303004"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("FTP command unsupported - failed strict inspection"),
}),
]),
});
var msg449 = match({
id: "MESSAGE#1082:717036",
dissect: {
tokenizer: "Looking for a tunnel group match based on certificate maps for peer certificate with serial number: %{serial_number->}, subject name: %{cert_subject->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup58,
set_field({
dest: "nwparser.msg_id1",
value: constant("717036"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var all119 = all_match({
processors: [
dup44,
dup280,
dup33,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("714011"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg450 = match({
id: "MESSAGE#990:714011:01/0",
dissect: {
tokenizer: "%{->}ID_IPV4_ADDR%{p0->}",
field: "nwparser.payload",
},
});
var msg451 = match({
id: "MESSAGE#990:714011:01/2",
dissect: {
tokenizer: "_SUBNET%{p1->}",
field: "nwparser.p0",
},
});
var select107 = linear_select([
msg451,
]);
var msg452 = match({
id: "MESSAGE#990:714011:01/2",
dissect: {
tokenizer: "%{->}ID %{fld1->}",
field: "nwparser.p1",
},
});
var all120 = all_match({
processors: [
msg450,
select107,
msg452,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("714011:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var select108 = linear_select([
all119,
all120,
]);
var msg453 = match({
id: "MESSAGE#302:302014:03/2",
dissect: {
tokenizer: "%{dinterface->}:%{daddr->}/%{dport->}(%{ddomain->}\\%{c_username->}) duration %{duration->} bytes %{bytes->} %{p2->}",
field: "nwparser.p1",
},
});
var msg454 = match({
id: "MESSAGE#302:302014:03/3",
dissect: {
tokenizer: "\u003c\u003c%{result->}> (%{username->})",
field: "nwparser.p2",
},
});
var msg455 = match({
id: "MESSAGE#302:302014:03/3",
dissect: {
tokenizer: "%{result->} (%{username->})",
field: "nwparser.p2",
},
});
var msg456 = match({
id: "MESSAGE#302:302014:03/3",
dissect: {
tokenizer: "(%{result->}) ",
field: "nwparser.p2",
},
});
var select109 = linear_select([
msg454,
msg455,
msg456,
dup281,
]);
var all121 = all_match({
processors: [
dup146,
dup147,
msg453,
select109,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302014:03"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var msg457 = match({
id: "MESSAGE#303:302014:02/0",
dissect: {
tokenizer: "Teardown %{protocol->} connection %{connectionid->} for %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}(%{ddomain->}\\%{c_username->}) duration %{duration->} bytes %{bytes->} %{p0->}",
field: "nwparser.payload",
},
});
var msg458 = match({
id: "MESSAGE#303:302014:02/1",
dissect: {
tokenizer: "%{->} %{result->}",
field: "nwparser.p0",
},
});
var select110 = linear_select([
dup282,
msg458,
]);
var all122 = all_match({
processors: [
msg457,
select110,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302014:02"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var msg459 = match({
id: "MESSAGE#304:302014:04/2",
dissect: {
tokenizer: "%{->} %{saddr->}/%{sport->}(%{fld3->}) to %{p1->}",
field: "nwparser.p0",
},
});
var msg460 = match({
id: "MESSAGE#304:302014:04/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->} to%{p1->}",
field: "nwparser.p0",
},
});
var select111 = linear_select([
dup283,
msg459,
msg460,
]);
var msg461 = match({
id: "MESSAGE#304:302014:04/2",
dissect: {
tokenizer: "%{->} %{dinterface->}:%{daddr->}/%{dport->}(%{fld20->}) duration %{duration->} bytes %{bytes->} %{p2->}",
field: "nwparser.p1",
},
});
var all123 = all_match({
processors: [
dup146,
select111,
msg461,
dup284,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302014:04"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var msg462 = match({
id: "MESSAGE#305:302014:05/0",
dissect: {
tokenizer: "Teardown %{protocol->} connection %{connectionid->} for %{sinterface->}:%{saddr->}/%{sport->}(%{fld3->}) to %{dinterface->}:%{daddr->}/%{dport->} duration %{duration->} bytes %{bytes->} %{p0->}",
field: "nwparser.payload",
},
});
var msg463 = match({
id: "MESSAGE#305:302014:05/1",
dissect: {
tokenizer: "%{info->} (%{username->})",
field: "nwparser.p0",
},
});
var msg464 = match({
id: "MESSAGE#305:302014:05/1",
dissect: {
tokenizer: "%{info->}",
field: "nwparser.p0",
},
});
var select112 = linear_select([
msg463,
msg464,
]);
var all124 = all_match({
processors: [
msg462,
select112,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302014:05"),
}),
dup42,
dup43,
dup40,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var select113 = linear_select([
dup283,
dup156,
]);
var msg465 = match({
id: "MESSAGE#306:302014/2",
dissect: {
tokenizer: "%{dinterface->}:%{daddr->}/%{dport->} duration %{duration->} bytes %{bytes->} %{p2->}",
field: "nwparser.p1",
},
});
var all125 = all_match({
processors: [
dup146,
select113,
msg465,
dup284,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302014"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var msg466 = match({
id: "MESSAGE#307:302014:01/0",
dissect: {
tokenizer: "Teardown %{protocol->} connection %{connectionid->} faddr %{saddr->}/%{sport->} gaddr %{hostip->}/%{network_port->} laddr %{daddr->}/%{dport->} duration %{duration->} bytes %{bytes->} %{p0->}",
field: "nwparser.payload",
},
});
var select114 = linear_select([
dup282,
dup285,
]);
var all126 = all_match({
processors: [
msg466,
select114,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("302014:01"),
}),
dup42,
dup43,
dup40,
dup14,
dup2,
dup3,
dup4,
dup5,
dup27,
dup148,
dup149,
]),
});
var select115 = linear_select([
all121,
all122,
all123,
all124,
all125,
all126,
]);
var msg467 = match({
id: "MESSAGE#760:611304",
dissect: {
tokenizer: "VPNClient: NAT exemption configured for Network Extension Mode with split tunneling: Split Tunnel Networks:%{->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup126,
set_field({
dest: "nwparser.msg_id1",
value: constant("611304"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
dup286,
]),
});
var all127 = all_match({
processors: [
dup287,
dup89,
dup288,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("702211:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup289,
dup4,
dup5,
]),
});
var all128 = all_match({
processors: [
dup287,
dup89,
dup290,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("702211"),
}),
dup7,
dup2,
dup3,
dup289,
dup4,
dup5,
]),
});
var select116 = linear_select([
all127,
all128,
]);
var msg468 = match({
id: "MESSAGE#849:711001",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("711001"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg469 = match({
id: "MESSAGE#12:120008",
dissect: {
tokenizer: "Call-Home client %{action->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("120008"),
}),
dup4,
dup5,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("Call-Home client activity"),
}),
]),
});
var msg470 = match({
id: "MESSAGE#236:209001",
dissect: {
tokenizer: "IPFRAG: Unable to allocate frag record for %{saddr->}/%{sport->} to %{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup26,
set_field({
dest: "nwparser.msg_id1",
value: constant("209001"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Unable to allocate frag record"),
}),
]),
});
var msg471 = match({
id: "MESSAGE#659:420004",
dissect: {
tokenizer: "Virtual Sensor %{vsys->} was added on the %{product->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup163,
set_field({
dest: "nwparser.msg_id1",
value: constant("420004"),
}),
dup164,
dup38,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Virtual Sensor added"),
}),
]),
});
var msg472 = match({
id: "MESSAGE#580:403501",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("403501"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg473 = match({
id: "MESSAGE#1095:718033",
dissect: {
tokenizer: "Send TOPOLOGY indicator failure to [%{daddr->}]",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("718033"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Sent TOPOLOGY indicator failure"),
}),
]),
});
var msg474 = match({
id: "MESSAGE#123:109002/0",
dissect: {
tokenizer: "%{->}Auth %{p0->}",
field: "nwparser.payload",
},
});
var msg475 = match({
id: "MESSAGE#123:109002/2",
dissect: {
tokenizer: "from %{saddr->}/%{sport->} to %{daddr->}/%{dport->} failed (server %{hostip->} failed) on interface %{sinterface->}",
field: "nwparser.p1",
},
});
var all129 = all_match({
processors: [
msg474,
dup254,
msg475,
],
on_success: processor_chain([
dup86,
set_field({
dest: "nwparser.msg_id1",
value: constant("109002"),
}),
dup18,
dup19,
dup2,
dup3,
dup4,
dup5,
dup291,
set_field({
dest: "nwparser.result",
value: constant("server failed"),
}),
]),
});
var msg476 = match({
id: "MESSAGE#239:209004",
dissect: {
tokenizer: "Invalid IP fragment, size = %{icmptype->} exceeds maximum size = %{icmpcode->}: %{space->} src = %{saddr->}, dest = %{daddr->}, proto = %{protocol->}, id = %{fld1->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("209004"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
set_field({
dest: "nwparser.event_description",
value: constant("Invalid IP fragment"),
}),
set_field({
dest: "nwparser.result",
value: constant("size exceeded"),
}),
]),
});
var msg477 = match({
id: "MESSAGE#421:316001",
dissect: {
tokenizer: "Denied new tunnel to %{saddr->} VPN peer limit (%{fld1->}) exceeded.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("316001"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("denied new VPN tunnel"),
}),
set_field({
dest: "nwparser.result",
value: constant("VPN peer limit exceeded"),
}),
]),
});
var msg478 = match({
id: "MESSAGE#422:316001:01/0",
dissect: {
tokenizer: "Cannot %{p0->}",
field: "nwparser.payload",
},
});
var msg479 = match({
id: "MESSAGE#422:316001:01/2",
dissect: {
tokenizer: "%{->}create%{p1->}",
field: "nwparser.p0",
},
});
var msg480 = match({
id: "MESSAGE#422:316001:01/2",
dissect: {
tokenizer: "creat%{p1->}",
field: "nwparser.p0",
},
});
var select117 = linear_select([
msg479,
msg480,
]);
var msg481 = match({
id: "MESSAGE#422:316001:01/2",
dissect: {
tokenizer: "%{->}more isakmp peers, exceeding the limit of %{fld1->} peers",
field: "nwparser.p1",
},
});
var all130 = all_match({
processors: [
msg478,
select117,
msg481,
],
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("316001:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("cannot create isakmp peers"),
}),
set_field({
dest: "nwparser.result",
value: constant("peer limit exceeded"),
}),
]),
});
var select118 = linear_select([
msg477,
all130,
]);
var msg482 = match({
id: "MESSAGE#494:338308",
dissect: {
tokenizer: "Dynamic filter updater server dynamically changed from %{change_old->} to %{change_new->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup157,
set_field({
dest: "nwparser.msg_id1",
value: constant("338308"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Dynamic filter updater server dynamically changed"),
}),
]),
});
var msg483 = match({
id: "MESSAGE#1078:717028",
dissect: {
tokenizer: "Certificate chain was successfully validated %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup292,
set_field({
dest: "nwparser.msg_id1",
value: constant("717028"),
}),
dup293,
dup38,
dup40,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("Certificate chain successfully validated"),
}),
]),
});
var msg484 = match({
id: "MESSAGE#77:106013:01",
dissect: {
tokenizer: "Dropping echo request from %{saddr->} to PAT address %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("106013:01"),
}),
dup99,
dup102,
dup43,
dup14,
dup2,
dup3,
dup294,
dup4,
dup5,
]),
});
var msg485 = match({
id: "MESSAGE#78:106013",
dissect: {
tokenizer: "Dropping echo request from %{saddr->} to address %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("106013"),
}),
dup99,
dup102,
dup43,
dup2,
dup3,
dup294,
dup4,
dup5,
]),
});
var select119 = linear_select([
msg484,
msg485,
]);
var msg486 = match({
id: "MESSAGE#382:305012:02",
dissect: {
tokenizer: "Teardown %{context->} %{protocol->} translation from %{sinterface->}:%{saddr->}/%{sport->}(%{fld51->}) to %{dinterface->}(%{fld52->}):%{daddr->}/%{dport->} duration %{duration->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305012:02"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup295,
]),
});
var msg487 = match({
id: "MESSAGE#383:305012/0",
dissect: {
tokenizer: "Teardown %{context->} %{protocol->} translation from %{sinterface->}:%{p0->}",
field: "nwparser.payload",
},
});
var msg488 = match({
id: "MESSAGE#383:305012/2",
dissect: {
tokenizer: "%{dinterface->}:%{daddr->}/%{dport->} duration %{duration->}",
field: "nwparser.p1",
},
});
var all131 = all_match({
processors: [
msg487,
dup296,
msg488,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305012"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup295,
]),
});
var msg489 = match({
id: "MESSAGE#384:305012:01/0",
dissect: {
tokenizer: "Teardown %{context->} %{protocol->} translation from %{sinterface->}:%{saddr->}/%{sport->} to %{p0->}",
field: "nwparser.payload",
},
});
var msg490 = match({
id: "MESSAGE#384:305012:01/2",
dissect: {
tokenizer: "%{daddr->}/%{dport->} duration %{duration->}",
field: "nwparser.p1",
},
});
var all132 = all_match({
processors: [
msg489,
dup297,
msg490,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305012:01"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup295,
]),
});
var select120 = linear_select([
msg486,
all131,
all132,
]);
var msg491 = match({
id: "MESSAGE#401:311001",
dissect: {
tokenizer: "LU loading standby start%{->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup37,
set_field({
dest: "nwparser.msg_id1",
value: constant("311001"),
}),
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("LU loading standby start"),
}),
dup4,
dup5,
]),
});
var msg492 = match({
id: "MESSAGE#455:324002",
dissect: {
tokenizer: "No %{fld1->} exists to process GTPv0 %{fld2->} from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}, TID: %{fld3->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("324002"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("nonexistent resource to process GTP request"),
}),
]),
});
var msg493 = match({
id: "MESSAGE#95:106025",
dissect: {
tokenizer: "%{event_description->}: %{interface->} %{protocol->} src %{saddr->}/%{sport->} dest %{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("106025"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg494 = match({
id: "MESSAGE#629:413003/0",
dissect: {
tokenizer: "Module in slot %{fld1->} is not a recognized type%{p0->}",
field: "nwparser.payload",
},
});
var select121 = linear_select([
dup298,
]);
var all133 = all_match({
processors: [
msg494,
select121,
dup223,
],
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("413003"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg495 = match({
id: "MESSAGE#1115:720006",
dissect: {
tokenizer: "(VPN-%{context->}) %{event_description->}.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("720006"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg496 = match({
id: "MESSAGE#1246:737026",
dissect: {
tokenizer: "%{process->}: Client assigned %{hostip->} from local pool",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("737026"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg497 = match({
id: "MESSAGE#1247:737026:01",
dissect: {
tokenizer: "%{process->}: Session=%{sessionid->}, Client assigned %{hostip->} from local pool",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("737026:01"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var select122 = linear_select([
msg496,
msg497,
]);
var msg498 = match({
id: "MESSAGE#626:412001",
dissect: {
tokenizer: "MAC %{interface->} moved from %{src_zone->} to %{dst_zone->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("412001"),
}),
dup38,
dup13,
dup39,
dup40,
dup3,
dup4,
dup5,
]),
});
var msg499 = match({
id: "MESSAGE#656:420002:01",
dissect: {
tokenizer: "IPS requested to drop %{protocol->} packets %{sinterface->}:%{saddr->} to %{dinterface->}:%{daddr->} (type %{icmptype->}, code %{icmpcode->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("420002:01"),
}),
dup42,
dup43,
dup19,
dup14,
dup2,
dup3,
dup4,
dup5,
dup299,
]),
});
var msg500 = match({
id: "MESSAGE#657:420002",
dissect: {
tokenizer: "%{service->} requested to drop %{protocol->} packet from %{sinterface->}:%{saddr->}/%{sport->} %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("420002"),
}),
dup42,
dup43,
dup19,
dup2,
dup3,
dup4,
dup5,
dup299,
]),
});
var select123 = linear_select([
msg499,
msg500,
]);
var msg501 = match({
id: "MESSAGE#676:500003",
dissect: {
tokenizer: "Bad %{protocol->} hdr length (hdrlen=%{fld1->}, pktlen=%{fld2->}) from %{saddr->}/%{sport->} to %{daddr->}/%{dport->}, flags: %{fld3->}, on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup41,
set_field({
dest: "nwparser.msg_id1",
value: constant("500003"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Bad hdr length"),
}),
]),
});
var all134 = all_match({
processors: [
dup22,
dup23,
dup300,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("713035"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg502 = match({
id: "MESSAGE#861:713035:01",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->} , %{action->}:%{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("713035:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var select124 = linear_select([
all134,
msg502,
]);
var msg503 = match({
id: "MESSAGE#162:110003:01/0",
dissect: {
tokenizer: "Routing failed to locate %{p0->}",
field: "nwparser.payload",
},
});
var msg504 = match({
id: "MESSAGE#162:110003:01/2",
dissect: {
tokenizer: "next-hop %{p1->}",
field: "nwparser.p0",
},
});
var msg505 = match({
id: "MESSAGE#162:110003:01/2",
dissect: {
tokenizer: "%{->}next hop%{p1->}",
field: "nwparser.p0",
},
});
var select125 = linear_select([
msg504,
msg505,
]);
var msg506 = match({
id: "MESSAGE#162:110003:01/2",
dissect: {
tokenizer: "%{->}for %{protocol->} from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.p1",
},
});
var all135 = all_match({
processors: [
msg503,
select125,
msg506,
],
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("110003:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: dup301,
}),
set_field({
dest: "nwparser.event_description",
value: dup301,
}),
]),
});
var msg507 = match({
id: "MESSAGE#163:110003:02",
dissect: {
tokenizer: "No interface is configured (with %{interface->}).",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("110003:02"),
}),
dup14,
dup2,
dup4,
dup5,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("No interface configured"),
}),
]),
});
var msg508 = match({
id: "MESSAGE#164:110003",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("110003"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var select126 = linear_select([
all135,
msg507,
msg508,
]);
var msg509 = match({
id: "MESSAGE#308:302015:05",
dissect: {
tokenizer: "Built inbound %{protocol->} connection %{connectionid->} for %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->})(%{domain->}\\%{fld3->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->})(%{fld4->}) (%{username->})",
field: "nwparser.payload",
},
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302015:05"),
}),
dup64,
dup102,
dup43,
dup2,
dup3,
dup4,
dup5,
dup192,
dup193,
]),
});
var msg510 = match({
id: "MESSAGE#309:302015/2",
dissect: {
tokenizer: "%{->}to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->} )%{p2->}",
field: "nwparser.p1",
},
});
var msg511 = match({
id: "MESSAGE#309:302015/3",
dissect: {
tokenizer: "%{->}'%{username->}' ",
field: "nwparser.p2",
},
});
var msg512 = match({
id: "MESSAGE#309:302015/3",
dissect: {
tokenizer: "%{->}(%{username->})",
field: "nwparser.p2",
},
});
var select127 = linear_select([
msg511,
msg512,
]);
var all136 = all_match({
processors: [
dup219,
dup220,
msg510,
select127,
],
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302015"),
}),
dup64,
dup102,
dup43,
dup2,
dup3,
dup4,
dup5,
dup192,
dup193,
]),
});
var all137 = all_match({
processors: [
dup221,
dup222,
dup223,
],
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302015:01"),
}),
dup64,
dup102,
dup43,
dup14,
dup2,
dup3,
dup4,
dup5,
dup194,
dup193,
]),
});
var msg513 = match({
id: "MESSAGE#311:302015:03/0",
dissect: {
tokenizer: "Built %{fld1->} %{protocol->} connection %{connectionid->} for %{dinterface->}:%{daddr->}/%{dport->} (%{p0->}",
field: "nwparser.payload",
},
});
var msg514 = match({
id: "MESSAGE#311:302015:03/2",
dissect: {
tokenizer: "%{dtransaddr->}/%{dtransport->})(%{fld3->}) to %{p1->}",
field: "nwparser.p0",
},
});
var select128 = linear_select([
dup225,
msg514,
dup226,
]);
var all138 = all_match({
processors: [
msg513,
select128,
dup227,
dup228,
],
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302015:03"),
}),
dup64,
dup102,
dup43,
dup14,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.direction",
value: field("fld1"),
}),
dup193,
]),
});
var msg515 = match({
id: "MESSAGE#312:302015:04",
dissect: {
tokenizer: "Built %{protocol->} connection %{connectionid->} for %{sinterface->} %{saddr->}/%{sport->} gaddr %{hostip->}/%{network_port->} %{dinterface->} %{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302015:04"),
}),
dup64,
dup102,
dup43,
dup14,
dup2,
dup3,
dup4,
dup5,
dup193,
]),
});
var select129 = linear_select([
msg509,
all136,
all137,
all138,
msg515,
]);
var msg516 = match({
id: "MESSAGE#527:400030",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup52,
set_field({
dest: "nwparser.msg_id1",
value: constant("400030"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg517 = match({
id: "MESSAGE#592:405103",
dissect: {
tokenizer: "H225 message from %{saddr->}/%{sport->} to %{daddr->}/%{dport->} contains bad protocol discriminator %{protocol->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup41,
set_field({
dest: "nwparser.msg_id1",
value: constant("405103"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("H225 message contains bad protocol discriminator"),
}),
]),
});
var msg518 = match({
id: "MESSAGE#1034:715061",
dissect: {
tokenizer: "Group = %{group->} IP = %{saddr->}, %{action->}.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("715061"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg519 = match({
id: "MESSAGE#1208:730010",
dissect: {
tokenizer: "Group \u003c\u003c%{group->}> User \u003c\u003c%{username->}> IP \u003c\u003c%{saddr->}> VLAN Mapping is enabled on VLAN \u003c\u003c%{instance->}>",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("730010"),
}),
dup4,
dup5,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("VLAN Mapping is enabled on VLAN"),
}),
]),
});
var msg520 = match({
id: "MESSAGE#27:105002",
dissect: {
tokenizer: "(%{context->})%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup59,
set_field({
dest: "nwparser.msg_id1",
value: constant("105002"),
}),
dup60,
dup38,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg521 = match({
id: "MESSAGE#461:325001",
dissect: {
tokenizer: "Router %{hostip_v6->} on %{interface->} has conflicting ND (Neighbor Discovery) settings",
field: "nwparser.payload",
},
on_success: processor_chain([
dup229,
set_field({
dest: "nwparser.msg_id1",
value: constant("325001"),
}),
dup38,
dup39,
dup87,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg522 = match({
id: "MESSAGE#1013:715040",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("715040"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg523 = match({
id: "MESSAGE#1025:715053/2",
dissect: {
tokenizer: "%{saddr->}, MODE_CFG: %{action->}",
field: "nwparser.p1",
},
});
var all139 = all_match({
processors: [
dup22,
dup23,
msg523,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("715053"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg524 = match({
id: "MESSAGE#1026:715053:01",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->}, MODE_CFG: %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("715053:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var select130 = linear_select([
all139,
msg524,
]);
var msg525 = match({
id: "MESSAGE#1307:776252",
dissect: {
tokenizer: "CTS SGT-MAP: Binding %{saddr->}/%{sport->}->%{fld1->}:%{group->} from %{fld2->} deleted from binding manager.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("776252"),
}),
dup14,
dup3,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("deleted to binding manager"),
}),
]),
});
var msg526 = match({
id: "MESSAGE#7:103002:01",
dissect: {
tokenizer: "(%{context->}) %{event_description->} failed",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("103002:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
dup302,
]),
});
var msg527 = match({
id: "MESSAGE#8:103002",
dissect: {
tokenizer: "(%{context->})%{event_description->} OK",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("103002"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.disposition",
value: constant("OK"),
}),
]),
});
var select131 = linear_select([
msg526,
msg527,
]);
var msg528 = match({
id: "MESSAGE#184:113008/0",
dissect: {
tokenizer: "AAA transaction status %{disposition->} : user = %{p0->}",
field: "nwparser.payload",
},
});
var all140 = all_match({
processors: [
msg528,
dup238,
],
on_success: processor_chain([
dup63,
set_field({
dest: "nwparser.msg_id1",
value: constant("113008"),
}),
dup17,
dup65,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg529 = match({
id: "MESSAGE#374:305007",
dissect: {
tokenizer: "%{fld1->}(): Orphan IP %{hostip->} on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("305007"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("Orphan IP detected on interface"),
}),
]),
});
var msg530 = match({
id: "MESSAGE#505:400008",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup113,
set_field({
dest: "nwparser.msg_id1",
value: constant("400008"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var all141 = all_match({
processors: [
dup22,
dup23,
dup241,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("713132"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg531 = match({
id: "MESSAGE#364:305003",
dissect: {
tokenizer: "Teardown translation for global %{hostip->} local %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305003"),
}),
dup2,
dup3,
dup4,
dup5,
dup295,
]),
});
var msg532 = match({
id: "MESSAGE#365:305003:01",
dissect: {
tokenizer: "Teardown translation for %{hostip->} %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305003:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
dup295,
]),
});
var select132 = linear_select([
msg531,
msg532,
]);
var msg533 = match({
id: "MESSAGE#481:338103/2",
dissect: {
tokenizer: "ilter %{action->} whitelisted %{protocol->} traffic from %{sinterface->}:%{saddr->}/%{sport->} (%{stransaddr->}/%{stransport->}) to %{dinterface->}:%{daddr->}/%{dport->} (%{dtransaddr->}/%{dtransport->}), source %{hostip->} resolved from %{listnum->} list:%{info->}",
field: "nwparser.p1",
},
});
var all142 = all_match({
processors: [
dup183,
dup184,
msg533,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("338103"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg534 = match({
id: "MESSAGE#767:611311",
dissect: {
tokenizer: "VPNClient: XAUTH Failed: Peer: %{saddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup16,
set_field({
dest: "nwparser.msg_id1",
value: constant("611311"),
}),
dup7,
dup18,
dup19,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("XAUTH failed"),
}),
]),
});
var msg535 = match({
id: "MESSAGE#833:703002",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("703002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg536 = match({
id: "MESSAGE#1100:718046",
dissect: {
tokenizer: "Create group policy [%{policyname->}]",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("718046"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Create group policy"),
}),
]),
});
var msg537 = match({
id: "MESSAGE#264:214001",
dissect: {
tokenizer: "Terminating manager session from %{saddr->} on interface %{interface->}.%{space->}Reason: %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup84,
set_field({
dest: "nwparser.msg_id1",
value: constant("214001"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Terminated manager session"),
}),
]),
});
var msg538 = match({
id: "MESSAGE#544:400047",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup52,
set_field({
dest: "nwparser.msg_id1",
value: constant("400047"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg539 = match({
id: "MESSAGE#933:713219/2",
dissect: {
tokenizer: "Group = %{group->} %{p1->}",
field: "nwparser.p0",
},
});
var select133 = linear_select([
msg539,
]);
var msg540 = match({
id: "MESSAGE#933:713219/2",
dissect: {
tokenizer: "IP = %{saddr->} Queuing KEY-ACQUIRE messages to be processed when P1 SA is complete",
field: "nwparser.p1",
},
});
var all143 = all_match({
processors: [
dup44,
select133,
msg540,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("713219"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("messages enqueued"),
}),
]),
});
var msg541 = match({
id: "MESSAGE#1066:717005",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("717005"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg542 = match({
id: "MESSAGE#1016:715046:01/1",
dissect: {
tokenizer: "%{->}Username = %{username->}, IP = %{saddr->}, %{p0->}",
field: "nwparser.payload",
},
});
var select134 = linear_select([
dup303,
msg542,
]);
var all144 = all_match({
processors: [
select134,
dup304,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("715046:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var all145 = all_match({
processors: [
dup44,
dup47,
dup48,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("715046"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var select135 = linear_select([
all144,
all145,
]);
var msg543 = match({
id: "MESSAGE#1058:716051",
dissect: {
tokenizer: "Group \u003c\u003c%{group->}> User \u003c\u003c%{username->}> IP \u003c\u003c%{hostip->}> Error adding dynamic ACL for user",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("716051"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Error adding dynamic ACL for user"),
}),
]),
});
var msg544 = match({
id: "MESSAGE#1074:717024",
dissect: {
tokenizer: "Checking CRL from trustpoint: %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("717024"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg545 = match({
id: "MESSAGE#1136:720044",
dissect: {
tokenizer: "(VPN-%{context->}) %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("720044"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg546 = match({
id: "MESSAGE#1202:725013",
dissect: {
tokenizer: "SSL Server %{interface->}:%{hostip->}/%{network_port->} choose cipher : %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("725013"),
}),
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("SSL Server choose cipher"),
}),
dup4,
dup5,
]),
});
var msg547 = match({
id: "MESSAGE#112:108001/0",
dissect: {
tokenizer: "SMTP made noop: out %{fld1->} in %{fld2->} data%{p0->}",
field: "nwparser.payload",
},
});
var msg548 = match({
id: "MESSAGE#112:108001/2",
dissect: {
tokenizer: ":%{p1->}",
field: "nwparser.p0",
},
});
var select136 = linear_select([
msg548,
]);
var msg549 = match({
id: "MESSAGE#112:108001/2",
dissect: {
tokenizer: "%{->} %{info->}",
field: "nwparser.p1",
},
});
var all146 = all_match({
processors: [
msg547,
select136,
msg549,
],
on_success: processor_chain([
dup195,
set_field({
dest: "nwparser.msg_id1",
value: constant("108001"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg550 = match({
id: "MESSAGE#573:403104",
dissect: {
tokenizer: "PPP virtual interface %{interface->} requires mschap for MPPE",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("403104"),
}),
dup38,
dup39,
dup87,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg551 = match({
id: "MESSAGE#734:605002",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("605002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg552 = match({
id: "MESSAGE#837:709004",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup37,
set_field({
dest: "nwparser.msg_id1",
value: constant("709004"),
}),
dup38,
dup39,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var all147 = all_match({
processors: [
dup305,
dup304,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("715049:01"),
}),
dup7,
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var all148 = all_match({
processors: [
dup44,
dup47,
dup48,
],
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("715049"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var select137 = linear_select([
all147,
all148,
]);
var msg553 = match({
id: "MESSAGE#1268:751007",
dissect: {
tokenizer: "Local:%{saddr->}:%{sport->} Remote:%{daddr->}:%{dport->} Username:%{username->} Configured attribute not supported for IKEv2. Attribute: %{obj_name->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("751007"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Configured attribute not supported for IKEv2"),
}),
]),
});
var msg554 = match({
id: "MESSAGE#167:111003",
dissect: {
tokenizer: "%{hostip->} Erase configuration",
field: "nwparser.payload",
},
on_success: processor_chain([
dup107,
set_field({
dest: "nwparser.msg_id1",
value: constant("111003"),
}),
dup38,
dup108,
dup39,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Erase configuration"),
}),
]),
});
var msg555 = match({
id: "MESSAGE#536:400039",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup52,
set_field({
dest: "nwparser.msg_id1",
value: constant("400039"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var all149 = all_match({
processors: [
dup79,
dup80,
dup81,
],
on_success: processor_chain([
dup82,
set_field({
dest: "nwparser.msg_id1",
value: constant("715007"),
}),
dup7,
dup11,
dup12,
dup164,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg556 = match({
id: "MESSAGE#995:715007:01",
dissect: {
tokenizer: "IKE got a KEY_ADD msg for SA: SPI = %{dst_spi->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup250,
set_field({
dest: "nwparser.msg_id1",
value: constant("715007:01"),
}),
dup7,
dup11,
dup12,
dup164,
dup40,
dup14,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("IKE got a KEY_ADD msg for SA"),
}),
]),
});
var select138 = linear_select([
all149,
msg556,
]);
var msg557 = match({
id: "MESSAGE#1048:716004/2",
dissect: {
tokenizer: "%{saddr->}> %{network_service->} access DENIED to specified location: %{info->}",
field: "nwparser.p1",
},
});
var all150 = all_match({
processors: [
dup77,
dup78,
msg557,
],
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("716004"),
}),
dup18,
dup17,
dup106,
dup19,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("access DENIED"),
}),
]),
});
var msg558 = match({
id: "MESSAGE#1206:730001",
dissect: {
tokenizer: "Group \u003c\u003c%{group->}> User \u003c\u003c%{username->}> IP \u003c\u003c%{saddr->}> VLAN Mapping to VLAN \u003c\u003c%{instance->}>",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("730001"),
}),
dup4,
dup5,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("VLAN Mapping to VLAN"),
}),
]),
});
var msg559 = match({
id: "MESSAGE#1312:434004",
dissect: {
tokenizer: "SFR requested ASA to bypass further packet redirection and process %{protocol->} flow from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->} locally",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("434004"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("SFR requested ASA to bypass further packet redirection"),
}),
]),
});
var msg560 = match({
id: "MESSAGE#377:305010",
dissect: {
tokenizer: "Teardown %{context->} translation from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->} duration %{duration->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305010"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup295,
]),
});
var msg561 = match({
id: "MESSAGE#378:305010:01",
dissect: {
tokenizer: "Teardown %{context->} translation from %{sinterface->}:%{saddr->} to %{dinterface->}:%{daddr->} duration %{duration->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305010:01"),
}),
dup42,
dup43,
dup40,
dup14,
dup2,
dup3,
dup4,
dup5,
dup295,
]),
});
var select139 = linear_select([
msg560,
msg561,
]);
var msg562 = match({
id: "MESSAGE#871:713061",
dissect: {
tokenizer: "Group = %{group->}, IP = %{saddr->} , %{action->}:%{info->} on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup180,
set_field({
dest: "nwparser.msg_id1",
value: constant("713061"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("no matching crypto map entry"),
}),
]),
});
var msg563 = match({
id: "MESSAGE#89:106021",
dissect: {
tokenizer: "Deny %{protocol->} reverse path check from %{saddr->} to %{daddr->} on interface %{interface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup26,
set_field({
dest: "nwparser.msg_id1",
value: constant("106021"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup196,
]),
});
var msg564 = match({
id: "MESSAGE#122:109001/0",
dissect: {
tokenizer: "Auth start for user %{p0->}",
field: "nwparser.payload",
},
});
var msg565 = match({
id: "MESSAGE#122:109001/2",
dissect: {
tokenizer: "%{saddr->}/%{sport->} to %{daddr->}/%{dport->}",
field: "nwparser.p1",
},
});
var all151 = all_match({
processors: [
msg564,
dup61,
msg565,
],
on_success: processor_chain([
dup83,
set_field({
dest: "nwparser.msg_id1",
value: constant("109001"),
}),
dup17,
dup60,
dup18,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("Start_Session"),
}),
]),
});
var msg566 = match({
id: "MESSAGE#208:199007/0",
dissect: {
tokenizer: "Reload scheduled for %{fld1->} by %{p0->}",
field: "nwparser.payload",
},
});
var msg567 = match({
id: "MESSAGE#208:199007/2",
dissect: {
tokenizer: "%{fld2->}. Reload reason: %{result->}",
field: "nwparser.p1",
},
});
var all152 = all_match({
processors: [
msg566,
dup104,
msg567,
],
on_success: processor_chain([
dup166,
set_field({
dest: "nwparser.msg_id1",
value: constant("199007"),
}),
dup13,
dup38,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("Reload scheduled"),
}),
dup4,
dup5,
]),
});
var msg568 = match({
id: "MESSAGE#336:302023",
dissect: {
tokenizer: "Teardown IP protocol %{protocol->} connection %{connectionid->} for %{sinterface->}:%{saddr->} to %{dinterface->}:%{daddr->} duration %{duration->} bytes %{bytes->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("302023"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup306,
]),
});
var msg569 = match({
id: "MESSAGE#337:302023:01",
dissect: {
tokenizer: "Teardown stub %{protocol->} connection for %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->} duration %{duration->} forwarded bytes %{bytes->} %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("302023:01"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
]),
});
var select140 = linear_select([
msg568,
msg569,
]);
var msg570 = match({
id: "MESSAGE#1315:199017",
dissect: {
tokenizer: "%{fld1->} %{fld2->} %{fld3->}:%{fld4->}:%{fld5->} %{fld6->}: %{info->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup264,
set_field({
dest: "nwparser.msg_id1",
value: constant("199017"),
}),
dup3,
dup4,
dup5,
]),
});
var select141 = linear_select([
dup308,
dup309,
]);
var all153 = all_match({
processors: [
dup307,
select141,
dup310,
],
on_success: processor_chain([
dup204,
set_field({
dest: "nwparser.msg_id1",
value: constant("302026"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup311,
]),
});
var msg571 = match({
id: "MESSAGE#559:402116/2",
dissect: {
tokenizer: "%{daddr->}. %{result->}",
field: "nwparser.p1",
},
});
var all154 = all_match({
processors: [
dup312,
dup313,
msg571,
],
on_success: processor_chain([
dup55,
set_field({
dest: "nwparser.msg_id1",
value: constant("402116"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("Bad ESP packet"),
}),
dup56,
]),
});
var msg572 = match({
id: "MESSAGE#844:710003",
dissect: {
tokenizer: "%{protocol->} access denied by ACL from %{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup84,
set_field({
dest: "nwparser.msg_id1",
value: constant("710003"),
}),
dup42,
dup43,
dup99,
dup2,
dup3,
dup4,
dup5,
dup27,
set_field({
dest: "nwparser.event_description",
value: constant("access denied"),
}),
]),
});
var msg573 = match({
id: "MESSAGE#1143:720063",
dissect: {
tokenizer: "(VPN-%{context->}) %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup58,
set_field({
dest: "nwparser.msg_id1",
value: constant("720063"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg574 = match({
id: "MESSAGE#180:113004/0",
dissect: {
tokenizer: "AAA user a%{p0->}",
field: "nwparser.payload",
},
});
var msg575 = match({
id: "MESSAGE#180:113004/2",
dissect: {
tokenizer: "uthentication%{p1->}",
field: "nwparser.p0",
},
});
var msg576 = match({
id: "MESSAGE#180:113004/2",
dissect: {
tokenizer: "uthorization%{p1->}",
field: "nwparser.p0",
},
});
var msg577 = match({
id: "MESSAGE#180:113004/2",
dissect: {
tokenizer: "ccounting%{p1->}",
field: "nwparser.p0",
},
});
var select142 = linear_select([
msg575,
msg576,
msg577,
]);
var msg578 = match({
id: "MESSAGE#180:113004/2",
dissect: {
tokenizer: "%{->}Successful : server = %{hostip->} : user = %{p2->}",
field: "nwparser.p1",
},
});
var all155 = all_match({
processors: [
msg574,
select142,
msg578,
dup237,
],
on_success: processor_chain([
dup63,
set_field({
dest: "nwparser.msg_id1",
value: constant("113004"),
}),
dup18,
dup40,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("AAA user accounting/authentication successful"),
}),
]),
});
var msg579 = match({
id: "MESSAGE#637:415005",
dissect: {
tokenizer: "%{sigid->} Content type does not match specified type - %{listnum->} Content Verification Failed from %{saddr->} to %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup206,
set_field({
dest: "nwparser.msg_id1",
value: constant("415005"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.context",
value: constant("Content type does not match specified type"),
}),
]),
});
var msg580 = match({
id: "MESSAGE#704:507003/2",
dissect: {
tokenizer: "ud%{p1->}",
field: "nwparser.p0",
},
});
var msg581 = match({
id: "MESSAGE#704:507003/2",
dissect: {
tokenizer: "tc%{p1->}",
field: "nwparser.p0",
},
});
var select143 = linear_select([
msg580,
msg581,
]);
var msg582 = match({
id: "MESSAGE#704:507003/2",
dissect: {
tokenizer: "p flow from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->} terminated by %{service->}, reason - %{result->}",
field: "nwparser.p1",
},
});
var all156 = all_match({
processors: [
dup44,
select143,
msg582,
],
on_success: processor_chain([
dup36,
set_field({
dest: "nwparser.msg_id1",
value: constant("507003"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("tcp/udp flow terminated"),
}),
]),
});
var msg583 = match({
id: "MESSAGE#1116:720010",
dissect: {
tokenizer: "(VPN-%{context->}) %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup160,
set_field({
dest: "nwparser.msg_id1",
value: constant("720010"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg584 = match({
id: "MESSAGE#404:311004",
dissect: {
tokenizer: "LU xmit thread up%{->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup37,
set_field({
dest: "nwparser.msg_id1",
value: constant("311004"),
}),
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("LU xmit thread up"),
}),
dup4,
dup5,
]),
});
var msg585 = match({
id: "MESSAGE#531:400034",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup76,
set_field({
dest: "nwparser.msg_id1",
value: constant("400034"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg586 = match({
id: "MESSAGE#900:713133/2",
dissect: {
tokenizer: "%{saddr->}, Mismatch: %{event_description->}",
field: "nwparser.p1",
},
});
var all157 = all_match({
processors: [
dup22,
dup23,
msg586,
],
on_success: processor_chain([
dup51,
set_field({
dest: "nwparser.msg_id1",
value: constant("713133"),
}),
dup7,
dup38,
dup39,
dup19,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg587 = match({
id: "MESSAGE#1113:720004",
dissect: {
tokenizer: "(VPN-%{context->}) %{event_description->}.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("720004"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var all158 = all_match({
processors: [
dup44,
dup175,
dup33,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("715063"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg588 = match({
id: "MESSAGE#359:304007",
dissect: {
tokenizer: "URL Server %{hostip->} not responding, ENTERING ALLOW mode",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("304007"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg589 = match({
id: "MESSAGE#379:305011:02",
dissect: {
tokenizer: "Built %{context->} %{protocol->} translation from %{sinterface->}:%{saddr->}/%{sport->}(%{fld51->}) to %{dinterface->}(%{fld52->}):%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305011:02"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup234,
]),
});
var msg590 = match({
id: "MESSAGE#380:305011/0",
dissect: {
tokenizer: "Built %{context->} %{protocol->} translation from %{sinterface->}:%{p0->}",
field: "nwparser.payload",
},
});
var all159 = all_match({
processors: [
msg590,
dup296,
dup260,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305011"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup234,
]),
});
var msg591 = match({
id: "MESSAGE#381:305011:01/0",
dissect: {
tokenizer: "Built %{context->} %{protocol->} translation from %{sinterface->}:%{saddr->}/%{sport->} to %{p0->}",
field: "nwparser.payload",
},
});
var all160 = all_match({
processors: [
msg591,
dup297,
dup314,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("305011:01"),
}),
dup42,
dup43,
dup40,
dup2,
dup3,
dup4,
dup5,
dup234,
]),
});
var select144 = linear_select([
msg589,
all159,
all160,
]);
var msg592 = match({
id: "MESSAGE#747:609001",
dissect: {
tokenizer: "Built local-host %{interface->}:%{hostip->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("609001"),
}),
dup4,
dup5,
dup2,
dup3,
]),
});
var msg593 = match({
id: "MESSAGE#830:702303",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("702303"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg594 = match({
id: "MESSAGE#627:413001",
dissect: {
tokenizer: "Module in slot%{fld1->}is not able to shut down. %{space->} Module Error: %{fld2->} %{fld3->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("413001"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg595 = match({
id: "MESSAGE#748:609002:01/0",
dissect: {
tokenizer: "Teardown local%{p0->}",
field: "nwparser.payload",
},
});
var msg596 = match({
id: "MESSAGE#748:609002:01/2",
dissect: {
tokenizer: "host %{interface->}:%{hostip->} duration %{duration->}",
field: "nwparser.p1",
},
});
var all161 = all_match({
processors: [
msg595,
dup115,
msg596,
],
on_success: processor_chain([
dup21,
set_field({
dest: "nwparser.msg_id1",
value: constant("609002:01"),
}),
dup43,
dup42,
dup40,
dup14,
dup4,
dup5,
dup2,
dup3,
dup306,
]),
});
var msg597 = match({
id: "MESSAGE#799:620002:01",
dissect: {
tokenizer: "Unsupported CTIQBE version: %{fld1->}: from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("620002:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg598 = match({
id: "MESSAGE#800:620002",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("620002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var select145 = linear_select([
msg597,
msg598,
]);
var msg599 = match({
id: "MESSAGE#213:199908",
dissect: {
tokenizer: "%{protocol->} detected an attached application using local port %{sport->} and destination port %{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("199908"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg600 = match({
id: "MESSAGE#460:324007",
dissect: {
tokenizer: "Unable to create GTP connection for response from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("324007"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("Unable to create GTP connection"),
}),
]),
});
var msg601 = match({
id: "MESSAGE#488:338302/0",
dissect: {
tokenizer: "Address %{hostip->} discovered for domain %{web_domain->} from %{p0->}",
field: "nwparser.payload",
},
});
var msg602 = match({
id: "MESSAGE#488:338302/2",
dissect: {
tokenizer: "%{category->}.%{p1->}",
field: "nwparser.p0",
},
});
var msg603 = match({
id: "MESSAGE#488:338302/2",
dissect: {
tokenizer: "%{category->},%{p1->}",
field: "nwparser.p0",
},
});
var select146 = linear_select([
msg602,
msg603,
]);
var msg604 = match({
id: "MESSAGE#488:338302/2",
dissect: {
tokenizer: "%{->}Adding rule",
field: "nwparser.p1",
},
});
var all162 = all_match({
processors: [
msg601,
select146,
msg604,
],
on_success: processor_chain([
dup163,
set_field({
dest: "nwparser.msg_id1",
value: constant("338302"),
}),
dup164,
dup38,
dup2,
dup3,
dup4,
dup5,
]),
});
var msg605 = match({
id: "MESSAGE#501:400004",
dissect: {
tokenizer: "%{product->}:%{sigid->} %{context->} from %{saddr->} to %{daddr->} on interface %{dinterface->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup26,
set_field({
dest: "nwparser.msg_id1",
value: constant("400004"),
}),
dup2,
dup3,
dup4,
dup5,
dup27,
dup28,
dup29,
dup30,
]),
});
var msg606 = match({
id: "MESSAGE#688:504002:01",
dissect: {
tokenizer: "Security context %{info->} was removed from the system",
field: "nwparser.payload",
},
on_success: processor_chain([
dup107,
set_field({
dest: "nwparser.msg_id1",
value: constant("504002:01"),
}),
dup108,
dup38,
dup14,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("Security context removed"),
}),
dup4,
dup5,
]),
});
var msg607 = match({
id: "MESSAGE#689:504002",
dissect: {
tokenizer: "%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup107,
set_field({
dest: "nwparser.msg_id1",
value: constant("504002"),
}),
dup108,
dup38,
dup2,
dup3,
dup4,
dup5,
]),
});
var select147 = linear_select([
msg606,
msg607,
]);
var msg608 = match({
id: "MESSAGE#1256:746006",
dissect: {
tokenizer: "%{application->}: %{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup20,
set_field({
dest: "nwparser.msg_id1",
value: constant("746006"),
}),
dup3,
]),
});
var msg609 = match({
id: "MESSAGE#684:502112/0",
dissect: {
tokenizer: "Group policy deleted: name: %{p0->}",
field: "nwparser.payload",
},
});
var all163 = all_match({
processors: [
msg609,
dup315,
dup316,
],
on_success: processor_chain([
set_field({
dest: "nwparser.eventcategory",
value: constant("1502040000"),
}),
set_field({
dest: "nwparser.msg_id1",
value: constant("502112"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("Group policy deleted"),
}),
]),
});
var msg610 = match({
id: "MESSAGE#752:611101/0",
dissect: {
tokenizer: "User authentication succeeded: Uname: %{p0->}",
field: "nwparser.payload",
},
});
var all164 = all_match({
processors: [
msg610,
dup238,
],
on_success: processor_chain([
dup105,
set_field({
dest: "nwparser.msg_id1",
value: constant("611101"),
}),
dup7,
dup18,
dup17,
dup106,
dup40,
dup2,
dup3,
dup4,
dup5,
dup317,
]),
});
var msg611 = match({
id: "MESSAGE#753:611101:01/0",
dissect: {
tokenizer: "User authentication succeeded: IP address: %{saddr->}, Uname: %{p0->}",
field: "nwparser.payload",
},
});
var all165 = all_match({
processors: [
msg611,
dup238,
],
on_success: processor_chain([
dup105,
set_field({
dest: "nwparser.msg_id1",
value: constant("611101:01"),
}),
dup7,
dup18,
dup17,
dup106,
dup40,
dup2,
dup3,
dup4,
dup5,
dup317,
]),
});
var select148 = linear_select([
all164,
all165,
]);
var msg612 = match({
id: "MESSAGE#884:713117/2",
dissect: {
tokenizer: "%{group->}, Username = %{username->}, IP = %{saddr->} Received Invalid SPI notify (SPI %{p1->}",
field: "nwparser.p0",
},
});
var msg613 = match({
id: "MESSAGE#884:713117/2",
dissect: {
tokenizer: "%{group->}, IP = %{saddr->}, Received Invalid SPI notify (SPI %{p1->}",
field: "nwparser.p0",
},
});
var select149 = linear_select([
msg612,
msg613,
]);
var msg614 = match({
id: "MESSAGE#884:713117/2",
dissect: {
tokenizer: "%{dst_spi->})!",
field: "nwparser.p1",
},
});
var all166 = all_match({
processors: [
dup9,
select149,
msg614,
],
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("713117"),
}),
dup7,
dup4,
dup5,
dup2,
dup3,
set_field({
dest: "nwparser.event_description",
value: constant("Received Invalid SPI notify"),
}),
]),
});
var msg615 = match({
id: "MESSAGE#1189:725005:01/0",
dissect: {
tokenizer: "SSL server %{sinterface->}:%{saddr->}/%{sport->} to %{daddr->}/%{dport->} requesting our device certificate for authentication%{p0->}",
field: "nwparser.payload",
},
});
var all167 = all_match({
processors: [
msg615,
dup254,
dup255,
],
on_success: processor_chain([
dup83,
set_field({
dest: "nwparser.msg_id1",
value: constant("725005:01"),
}),
dup2,
dup3,
dup318,
dup4,
dup5,
]),
});
var msg616 = match({
id: "MESSAGE#1190:725005",
dissect: {
tokenizer: "SSL server %{interface->}:%{hostip->}/%{network_port->} requesting our device certificate for authentication.",
field: "nwparser.payload",
},
on_success: processor_chain([
dup83,
set_field({
dest: "nwparser.msg_id1",
value: constant("725005"),
}),
dup2,
dup3,
dup318,
dup4,
dup5,
]),
});
var select150 = linear_select([
all167,
msg616,
]);
var msg617 = match({
id: "MESSAGE#194:113019:01/2",
dissect: {
tokenizer: "%{saddr->}, %{action->} Session Type: %{network_service->}, Duration: %{day->}d %{hour->}h:%{min->}m:%{second->}s, Bytes xmt: %{sbytes->}, Bytes rcv: %{rbytes->}, Reason: %{result->}",
field: "nwparser.p1",
},
});
var all168 = all_match({
processors: [
dup22,
dup23,
msg617,
],
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("113019:01"),
}),
dup14,
dup2,
dup3,
dup319,
dup4,
dup5,
call({
dest: "nwparser.duration",
fn: DUR,
args: [
constant("%A%N%T%O"),
field("day"),
field("hour"),
field("min"),
field("second"),
],
}),
]),
});
var msg618 = match({
id: "MESSAGE#195:113019:02/2",
dissect: {
tokenizer: "%{saddr->}, %{action->} Session Type: %{network_service->}, Duration: %{hour->}h:%{min->}m:%{second->}s, Bytes xmt: %{sbytes->}, Bytes rcv: %{rbytes->}, Reason: %{result->}",
field: "nwparser.p1",
},
});
var all169 = all_match({
processors: [
dup22,
dup23,
msg618,
],
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("113019:02"),
}),
dup14,
dup2,
dup3,
dup319,
dup4,
dup5,
call({
dest: "nwparser.duration",
fn: DUR,
args: [
constant("%N%U%O"),
field("hour"),
field("min"),
field("second"),
],
}),
]),
});
var msg619 = match({
id: "MESSAGE#196:113019/2",
dissect: {
tokenizer: "%{saddr->}, %{action->} Session Type: %{network_service->}, Duration: %{duration->}, Bytes xmt: %{sbytes->}, Bytes rcv: %{rbytes->}, Reason: %{result->}",
field: "nwparser.p1",
},
});
var all170 = all_match({
processors: [
dup22,
dup23,
msg619,
],
on_success: processor_chain([
dup34,
set_field({
dest: "nwparser.msg_id1",
value: constant("113019"),
}),
dup2,
dup3,
dup319,
dup4,
dup5,
]),
});
var select151 = linear_select([
all168,
all169,
all170,
]);
var msg620 = match({
id: "MESSAGE#567:402126/0",
dissect: {
tokenizer: "CRYPTO: The %{product->} File %{p0->}",
field: "nwparser.payload",
},
});
var msg621 = match({
id: "MESSAGE#567:402126/2",
dissect: {
tokenizer: "\u003c\u003c%{filename->}> as a Soft Reset was necessary. %{p1->}",
field: "nwparser.p0",
},
});
var msg622 = match({
id: "MESSAGE#567:402126/2",
dissect: {
tokenizer: "'%{filename->}' as a Soft Reset was necessary. %{p1->}",
field: "nwparser.p0",
},
});
var msg623 = match({
id: "MESSAGE#567:402126/2",
dissect: {
tokenizer: "%{filename->} as a Soft Reset was necessary. %{p1->}",
field: "nwparser.p0",
},
});
var select152 = linear_select([
msg621,
msg622,
msg623,
]);
var all171 = all_match({
processors: [
msg620,
select152,
dup316,
],
on_success: processor_chain([
dup49,
set_field({
dest: "nwparser.msg_id1",
value: constant("402126"),
}),
dup7,
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.result",
value: constant("Crypto archive - soft reset"),
}),
]),
});
var msg624 = match({
id: "MESSAGE#640:415008",
dissect: {
tokenizer: "%{sigid->} HTTP RFC method illegal - %{listnum->} '%{protocol->}' from %{saddr->} to %{daddr->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup206,
set_field({
dest: "nwparser.msg_id1",
value: constant("415008"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.context",
value: constant("HTTP RFC method illegal"),
}),
]),
});
var msg625 = match({
id: "MESSAGE#641:415008:01",
dissect: {
tokenizer: "%{sigid->} HTTP - matched %{fld1->} in policy-map %{policyname->}, header matched - Resetting connection from %{sinterface->}:%{saddr->}/%{sport->} to %{dinterface->}:%{daddr->}/%{dport->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup206,
set_field({
dest: "nwparser.msg_id1",
value: constant("415008:01"),
}),
dup14,
dup2,
dup3,
dup4,
dup5,
]),
});
var select153 = linear_select([
msg624,
msg625,
]);
var msg626 = match({
id: "MESSAGE#663:421005/0",
dissect: {
tokenizer: "%{interface->}:%{hostip->} is counted as a user %{p0->}",
field: "nwparser.payload",
},
});
var msg627 = match({
id: "MESSAGE#663:421005/2",
dissect: {
tokenizer: "for%{p1->}",
field: "nwparser.p0",
},
});
var msg628 = match({
id: "MESSAGE#663:421005/2",
dissect: {
tokenizer: "of%{p1->}",
field: "nwparser.p0",
},
});
var select154 = linear_select([
msg627,
msg628,
]);
var msg629 = match({
id: "MESSAGE#663:421005/2",
dissect: {
tokenizer: "%{->} %{product->}",
field: "nwparser.p1",
},
});
var all172 = all_match({
processors: [
msg626,
select154,
msg629,
],
on_success: processor_chain([
dup186,
set_field({
dest: "nwparser.msg_id1",
value: constant("421005"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg630 = match({
id: "MESSAGE#631:414002",
dissect: {
tokenizer: "Failed to save logging buffer to flash:/syslog directory using filename: %{filename->}: [%{result->}]",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("414002"),
}),
dup2,
dup3,
dup4,
dup5,
]),
});
var msg631 = match({
id: "MESSAGE#35:105010",
dissect: {
tokenizer: "(%{context->})%{event_description->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup165,
set_field({
dest: "nwparser.msg_id1",
value: constant("105010"),
}),
dup2,
dup3,
dup167,
dup4,
dup5,
]),
});
var msg632 = match({
id: "MESSAGE#267:219002",
dissect: {
tokenizer: "%{service->} error, slot = %{fld1->}, device = %{fld2->}, address = %{fld3->}, byte count = %{bytes->}. Reason: %{result->}",
field: "nwparser.payload",
},
on_success: processor_chain([
dup10,
set_field({
dest: "nwparser.msg_id1",
value: constant("219002"),
}),
dup2,
dup3,
dup4,
dup5,
set_field({
dest: "nwparser.event_description",
value: constant("i2c_read_block_w_suspend() error"),
}),
]),
});
<