You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

323 lines
21 KiB

##
## SPDX-FileCopyrightText: 2021 Splunk, Inc. <sales@splunk.com>
## SPDX-License-Identifier: LicenseRef-Splunk-8-2021
##
##
###### Globals ######
## Apply the following properties to juniper data
[juniper]
SHOULD_LINEMERGE = false
# For load balancing on UF
EVENT_BREAKER_ENABLE = true
TRANSFORMS-force_info_for_juniper = force_host_for_netscreen_firewall,force_sourcetype_for_netscreen_firewall,force_sourcetype_for_junos_idp_structured,force_sourcetype_for_junos_idp,force_sourcetype_for_junos_aamw,force_sourcetype_for_junos_secintel,force_sourcetype_for_junos_firewall_structured,force_sourcetype_for_junos_firewall, force_sourcetype_for_junos_snmp,force_sourcetype_for_junos_firewall_rpd
###### Juniper Firewall (Netscreen Firewall) ######
[source::....netscreen_firewall]
sourcetype=netscreen:firewall
EVENT_BREAKER_ENABLE = true
[netscreen:firewall]
SHOULD_LINEMERGE = false
REPORT-dest_translated_for_netscreen_firewall = dest_translated_for_netscreen_firewall
REPORT-dvc_for_netscreen_firewall = dvc_for_netscreen_firewall
REPORT-src_translated_for_netscreen_firewall = src_translated_for_netscreen_firewall
REPORT-zone_for_netscreen_firewall = zone_for_netscreen_firewall
FIELDALIAS-bytes_in_for_netscreen_firewall = rcvd as bytes_in
FIELDALIAS-bytes_out_for_netscreen_firewall = sent as bytes_out
FIELDALIAS-dvc_dns_for_netscreen_firewall = device_id as dvc_dns
FIELDALIAS-rule_for_netscreen_firewall = policy_id as rule_id
FIELDALIAS-transport_id_for_netscreen_firewall = proto as transport_id
EVAL-action_type = if(isnotnull(action) AND (action=="failure" OR action=="created"), "communicate", "other")
EVAL-bytes = bytes_in + bytes_out
EVAL-dvc = coalesce(dvc, host)
EVAL-dest = coalesce(dst, dest, dest_ip, host)
EVAL-dest_ip = coalesce(dst, dest_ip)
EVAL-dest_port = coalesce(dest_port, dst_port)
EVAL-src = coalesce(src, src_ip)
EVAL-src_ip = if(match(src, "\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}"), src, src_ip)
EVAL-vendor_action = coalesce(vendor_action, action)
EVAL-vendor_product = "Juniper Netscreen Firewall"
LOOKUP-action_for_netscreen_firewall = juniper_netscreen_firewall_action_lookup vendor_action, action_type OUTPUT action, status
LOOKUP-transport_for_netscreen_firewall = juniper_transport_protocols_lookup transport_id as proto OUTPUT protocol, transport
## Netscreen Authentication Extractions
REPORT-app_for_netscreen_firewall = app_for_netscreen_firewall
REPORT-local_admin_auth_for_netscreen_firewall = local_admin_auth_for_netscreen_firewall
REPORT-login_refused_for_netscreen_firewall = login_refused_for_netscreen_firewall
REPORT-password_auth_for_netscreen_firewall = password_auth_for_netscreen_firewall
EVAL-app = case(isnotnull(app), lower(app), isnotnull(service), service)
## Netscreen Network Change Extractions
REPORT-firewall_change_for_netscreen_firewall = firewall_change_for_netscreen_firewall
EVAL-change_type = case(isnotnull(command), "policy", vendor_action == "reboot", "restart", true(), change_type)
EVAL-object_attrs = if(isnotnull(command), "services", object_attrs)
EVAL-object_category = if(isnotnull(command), "policy", object_category)
## Netscreen Restarts
REPORT-change_src_dest_for_netscreen_firewall= change_src_dest_for_netscreen_firewall
REPORT-login_failed_for_netscreen_firewall = login_failed_for_netscreen_firewall
REPORT-netscreen_restart = juniper_restart_field
REPORT-policy_id_for_netscreen_firewall = policy_id_for_netscreen_firewall
REPORT-translation_log_for_netscreen_firewall = translation_log_for_netscreen_firewall
REPORT-user_for_netscreen_firewall_restart = user_for_netscreen_firewall_restart
## Netscreen alerts
REPORT-alert_first_part_for_netscreen_firewall = alert_first_part_for_netscreen_firewall
REPORT-alert_rest_part_for_netscreen_firewall = alert_rest_part_for_netscreen_firewall
FIELDALIAS-signature_id_for_netscreen_firewall = alert_id as signature_id
FIELDALIAS-user_for_netscreen_firewall = netscreen_user as user
FIELDALIAS-object_id_for_netscreen_firewall = policy_id as object_id
EVAL-object = if(isnotnull(policy_id), "policy "+policy_id, object)
EVAL-severity = if(isnotnull(alert_id), "high", severity)
EVAL-type= if(isnotnull(alert_id), "alert", type)
LOOKUP-netscreen_firewall_ids_info_lookup = juniper_netscreen_firewall_ids_info_lookup alert_id OUTPUT ids_type,signature
###### JUNOS IDP ######
[source::....junos_idp]
TRANSFORMS-force_info_for_juniper = force_sourcetype_for_junos_idp_structured,force_sourcetype_for_junos_idp
EVENT_BREAKER_ENABLE = true
[juniper:junos:idp]
SHOULD_LINEMERGE = false
KV_MODE = auto
REPORT-message_tag = message_tag_for_junos_idp
REPORT-dvc = dvc_for_junos_idp
REPORT-auto_kv_for_junos_idp = auto_kv_for_junos_idp
FIELDALIAS-category = message_type AS category
FIELDALIAS-dest = dest_ip AS dest
FIELDALIAS-src = src_ip AS src
FIELDALIAS-user = username AS user
FIELDALIAS-vendor_action = action AS vendor_action
EVAL-action = case(action == "TRAFFIC_IPACTION_NOTIFY" OR action == "NONE" OR action == "IGNORE", "allowed", action == "TRAFFIC_IPACTION_DROP" OR action == "DROP", "blocked")
EVAL-app = "junos_idp"
EVAL-dvc = coalesce(dvc, host)
EVAL-ids_type = "network"
EVAL-severity = case(threat_severity == "CRITICAL", "critical", threat_severity == "HIGH", "high", threat_severity == "MEDIUM", "medium", threat_severity == "LOW", "low", threat_severity == "INFO" OR message_tag == "IDP_ATTACK_LOG_EVENT", "informational")
EVAL-signature = if(name=="_", "unknown", name)
EVAL-transport = lower(protocol)
EVAL-vendor_product = "Juniper IDP"
[juniper:junos:idp:structured]
SHOULD_LINEMERGE = false
KV_MODE = auto
REPORT-message_tag = message_tag_for_junos_idp
REPORT-dvc = dvc_for_junos_idp
FIELDALIAS-user = username AS user
FIELDALIAS-src = source_address AS src
FIELDALIAS-category = message_type AS category
FIELDALIAS-dest = destination_address AS dest
FIELDALIAS-dest_ip = destination_address AS dest_ip
FIELDALIAS-src_ip = source_address AS src_ip
FIELDALIAS-dest_port = destination_port AS dest_port
FIELDALIAS-vendor_action = action AS vendor_action
EVAL-action = case(action == "TRAFFIC_IPACTION_NOTIFY" OR action == "NONE" OR action == "IGNORE", "allowed", action == "TRAFFIC_IPACTION_DROP" OR action == "DROP", "blocked")
EVAL-app = "junos_idp"
EVAL-dvc = coalesce(dvc, host)
EVAL-ids_type = "network"
EVAL-severity = case(threat_severity == "CRITICAL", "critical", threat_severity == "HIGH", "high", threat_severity == "MEDIUM", "medium", threat_severity == "LOW", "low", threat_severity == "INFO" OR message_tag == "IDP_ATTACK_LOG_EVENT", "informational")
EVAL-signature = if(attack_name=="_", "unknown", attack_name)
EVAL-transport = lower(protocol_name)
EVAL-vendor_product = "Juniper IDP"
EVAL-src_port = coalesce(source_port, src_port)
###### JUNOS FW ######
[source::....junos_fw]
TRANSFORMS-force_info_for_juniper = force_sourcetype_for_junos_firewall_structured,force_sourcetype_for_junos_firewall
EVENT_BREAKER_ENABLE = true
[juniper:junos:firewall]
SHOULD_LINEMERGE = false
KV_MODE = auto
REPORT-message_tag = message_tag_for_junos_fw
REPORT-dvc = dvc_for_junos_fw
REPORT-auto_kv_for_junos_firewall = auto_kv_for_rt_screen,auto_kv_for_rt_flow_session_create,auto_kv_for_rt_flow_session_close,auto_kv_for_rt_flow_session_deny,auto_kv_for_apptrack_session_create,auto_kv_for_apptrack_session_vol_update,auto_kv_for_apptrack_session_close,auto_kv_for_rt_utm_webfilter,auto_kv_for_eswd_dai_failed,auto_kv_for_fw_eth_ip,auto_kv_for_eswd_stp_state_change_info,auto_kv_for_up_down,auto_kv_for_rt_alg_wrn_cfg_need_ls
FIELDALIAS-bytes_in = bytes_from_server AS bytes_in
FIELDALIAS-bytes_out = bytes_from_client AS bytes_out
FIELDALIAS-duration = elapsed_time AS duration
FIELDALIAS-packets_in = packets_from_server AS packets_in
FIELDALIAS-packets_out = packets_from_client AS packets_out
FIELDALIAS-service = service_name AS service
FIELDALIAS-src = src_ip AS src
FIELDALIAS-uri_path = OBJ AS uri_path
FIELDALIAS-url = URL AS url
EVAL-app = case(isnotnull(APPLICATION) AND isnotnull(NESTED_APPLICATION), APPLICATION + " " + NESTED_APPLICATION, isnotnull(vendor_app) AND isnotnull(nested_vendor_app), vendor_app + " " + nested_vendor_app, isnotnull(APPLICATION), APPLICATION, isnotnull(vendor_app), vendor_app, message_tag == "RT_FLOW_SESSION_CREATE" OR message_tag == "RT_FLOW_SESSION_CLOSE" OR message_tag == "RT_FLOW_SESSION_DENY" OR message_tag == "APPTRACK_SESSION_CREATE" OR message_tag == "APPTRACK_SESSION_CLOSE" OR message_tag == "APPTRACK_SESSION_VOL_UPDATE", case(isnotnull(service_name), service_name, true(), "other"))
EVAL-action = case(message_tag == "RT_FLOW_SESSION_CREATE" OR message_tag == "APPTRACK_SESSION_CREATE" OR message_tag == "APPTRACK_SESSION_VOL_UPDATE" OR message_tag == "WEBFILTER_URL_PERMITTED" OR lower(action_name) == "a", "allowed", message_tag == "RT_FLOW_SESSION_DENY" OR message_tag == "WEBFILTER_URL_BLOCKED" OR message_tag == "ESWD_DAI_FAILED" OR action == "drop" OR lower(action_name) == "d" OR lower(action_name) == "r", "blocked", message_tag == "RT_FLOW_SESSION_CLOSE" OR message_tag == "RT_FLOW_SESSION_CLOSE_LS" OR message_tag == "APPTRACK_SESSION_CLOSE", "teardown", message_tag == "ESWD_STP_STATE_CHANGE_INFO", "modified", isnotnull(action), lower(action))
EVAL-bytes = bytes_in + bytes_out
EVAL-category = case(message_tag == "RT_SCREEN_ICMP", "DOS", message_tag == "RT_SCREEN_TCP" OR message_tag == "RT_SCREEN_UDP", "Reconnaissance", isnotnull(vendor_app_sub_category), CATEGORY + " " + vendor_app_sub_category, true(), CATEGORY)
EVAL-dest_zone = coalesce(dest_zone, destination_zone, zone_name)
EVAL-dvc = coalesce(dvc, host)
EVAL-dvc_zone = case(message_tag != "RT_SCREEN_TCP" AND message_tag != "RT_SCREEN_UDP", zone_name)
EVAL-ids_type = case(message_tag == "RT_SCREEN_ICMP" OR message_tag == "RT_SCREEN_TCP" OR message_tag == "RT_SCREEN_UDP", "network", true(), ids_type)
EVAL-packets = coalesce(packets_in + packets_out, packets)
EVAL-protocol_id = case(service_name == "icmp" OR message_tag == "RT_SCREEN_ICMP", 1, message_tag == "RT_SCREEN_TCP" , 6, message_tag == "RT_SCREEN_UDP", 17, true(), protocol_id)
EVAL-rule = case(isnotnull(src_translated_rule_name) AND isnotnull(dest_translated_rule_name), case(isnotnull(rule_name), src_translated_rule_name + " " + dest_translated_rule_name + " " + rule_name, isnotnull(policy_name), src_translated_rule_name + " " + dest_translated_rule_name + " " + policy_name), isnotnull(src_translated_rule_name), case(isnotnull(rule_name), src_translated_rule_name + " " + rule_name, isnotnull(policy_name), src_translated_rule_name + " " + policy_name), isnotnull(dest_translated_rule_name), case(isnotnull(rule_name), dest_translated_rule_name + " " + rule_name, isnotnull(policy_name), dest_translated_rule_name + " " + policy_name), isnotnull(rule_name), rule_name, isnotnull(policy_name), policy_name, message_tag == "ESWD_DAI_FAILED", "ESWD_DAI_FAILED", message_tag == "PFE_FW_SYSLOG_ETH_IP", "PFE_FW_SYSLOG_ETH_IP")
EVAL-session_id = coalesce(SESSION_ID, session_id_32)
EVAL-severity = case(isnull(severity) AND (message_tag == "RT_SCREEN_ICMP" OR message_tag == "RT_SCREEN_TCP" OR message_tag == "RT_SCREEN_UDP"), "informational", true(), severity)
EVAL-src_interface = coalesce(src_interface, inbound_interface, uplink_incoming_interface)
EVAL-src_zone = coalesce(src_zone, source_zone, zone_name)
EVAL-user = coalesce(user, USERNAME)
EVAL-vendor_product = case(message_tag == "WEBFILTER_URL_PERMITTED" OR message_tag == "WEBFILTER_URL_BLOCKED", "Juniper Unified Threat Management", message_tag == "ESWD_DAI_FAILED" OR message_tag == "ESWD_STP_STATE_CHANGE_INFO" OR message_tag == "PFE_FW_SYSLOG_ETH_IP" OR service_name == "rpd", "Juniper JunOS", message_tag == "RT_SCREEN_ICMP" OR message_tag == "RT_SCREEN_TCP" OR message_tag == "RT_SCREEN_UDP", "Juniper IDS", true(), "Juniper SRX")
EVAL-vendor_action = case(lower(action_name) == "a", "allowed", lower(action_name) == "d" OR lower(action_name) == "r", "blocked", true(), action)
EVAL-object_id = case(message_tag == "ESWD_STP_STATE_CHANGE_INFO", interface_name, service_name == "rpd", interface_name, true(), object_id)
EVAL-dest = case(message_tag == "ESWD_STP_STATE_CHANGE_INFO" OR service_name == "rpd", host, true(), dest_ip)
EVAL-object = case(message_tag == "ESWD_STP_STATE_CHANGE_INFO", interface_name, service_name == "rpd", interface_name, true(), object)
LOOKUP-transport_for_junos_firewall = juniper_transport_protocols_lookup transport_id AS protocol_id OUTPUTNEW protocol, transport
[juniper:junos:firewall:structured]
SHOULD_LINEMERGE = false
KV_MODE = auto
REPORT-message_tag = message_tag_for_junos_fw
REPORT-dvc = dvc_for_junos_fw
REPORT-file_name = file_name_for_junos_fw
FIELDALIAS-bytes_in = bytes_from_server AS bytes_in
FIELDALIAS-bytes_out = bytes_from_client AS bytes_out
FIELDALIAS-dest = destination_address AS dest
FIELDALIAS-dest_ip = destination_address AS dest_ip
FIELDALIAS-dest_port = destination_port AS dest_port
FIELDALIAS-dest_translated_ip = nat_destination_address AS dest_translated_ip
FIELDALIAS-dest_translated_port = nat_destination_port AS dest_translated_port
FIELDALIAS-duration = elapsed_time AS duration
FIELDALIAS-file_path = filename AS file_path
FIELDALIAS-packets_in = packets_from_server AS packets_in
FIELDALIAS-packets_out = packets_from_client AS packets_out
FIELDALIAS-src = source_address AS src
FIELDALIAS-src_ip = source_address AS src_ip
FIELDALIAS-src_port = source_port AS src_port
FIELDALIAS-src_translated_ip = nat_source_address AS src_translated_ip
FIELDALIAS-src_translated_port = nat_source_port AS src_translated_port
FIELDALIAS-uri_path = obj AS uri_path
FIELDALIAS-user = username AS user
FIELDALIAS-vendor_action = action AS vendor_action
EVAL-action = case(message_tag == "RT_FLOW_SESSION_CREATE" OR message_tag == "APPTRACK_SESSION_CREATE" OR message_tag == "APPTRACK_SESSION_VOL_UPDATE" OR message_tag == "WEBFILTER_URL_PERMITTED" OR message_tag == "AV_VIRUS_DETECTED_MT", "allowed", message_tag == "RT_FLOW_SESSION_DENY" OR message_tag == "WEBFILTER_URL_BLOCKED", "blocked", message_tag == "RT_FLOW_SESSION_CLOSE" OR message_tag == "APPTRACK_SESSION_CLOSE", "teardown", isnotnull(action), lower(action))
EVAL-app = case(isnotnull(nested_application) AND isnotnull(application_category) AND isnotnull(application_sub_category), application + " " + nested_application + " " + application_category + " " + application_sub_category, isnotnull(nested_application), application + " " + nested_application, isnotnull(application), application, isnotnull(argument), argument, message_tag == "RT_FLOW_SESSION_CREATE" OR message_tag == "RT_FLOW_SESSION_CLOSE" OR message_tag == "RT_FLOW_SESSION_DENY" OR message_tag == "APPTRACK_SESSION_CREATE" OR message_tag == "APPTRACK_SESSION_CLOSE" OR message_tag == "APPTRACK_SESSION_VOL_UPDATE", case(isnotnull(service_name), service_name, true(), "other"))
EVAL-bytes = bytes_in + bytes_out
EVAL-category = case(message_tag == "CONTENT_FILTERING_BLOCKED_MT", "malware", isnotnull(category), category, isnotnull(reason), reason, message_tag == "AV_VIRUS_DETECTED_MT" and isnull(category), "virus")
EVAL-dest_interface = coalesce(destination_interface_name, packet_incoming_interface)
EVAL-dest_zone = coalesce(destination_zone_name, destination_zone)
EVAL-dvc = coalesce(dvc, host)
EVAL-ids_type = case(message_tag == "AV_VIRUS_DETECTED_MT" OR message_tag == "CONTENT_FILTERING_BLOCKED_MT", "network", true(), ids_type)
EVAL-packets = packets_in + packets_out
EVAL-protocol_id = case(message_tag == "AV_VIRUS_DETECTED_MT" OR message_tag == "CONTENT_FILTERING_BLOCKED_MT", 6, true(), protocol_id)
EVAL-rule = case(isnotnull(src_nat_rule_name) AND isnotnull(dst_nat_rule_name), case(isnotnull(rule_name), src_nat_rule_name + " " + dst_nat_rule_name + " " + rule_name, isnotnull(policy_name), src_nat_rule_name + " " + dst_nat_rule_name + " " + policy_name), isnotnull(src_nat_rule_name), case(isnotnull(rule_name), src_nat_rule_name + " " + rule_name, isnotnull(policy_name), src_nat_rule_name + " " + policy_name), isnotnull(dst_nat_rule_name), case(isnotnull(rule_name), dst_nat_rule_name + " " + rule_name, isnotnull(policy_name), dst_nat_rule_name + " " + policy_name), isnotnull(rule_name), rule_name, isnotnull(policy_name), policy_name)
EVAL-session_id = coalesce(session_id, session_id_32)
EVAL-severity = case(isnull(severity) AND (message_tag == "AV_VIRUS_DETECTED_MT" OR message_tag == "CONTENT_FILTERING_BLOCKED_MT"), "informational", true(), severity)
EVAL-signature = if(message_tag == "CONTENT_FILTERING_BLOCKED_MT", reason, name)
EVAL-src_zone = coalesce(source_zone_name, source_zone)
EVAL-vendor_product = if(message_tag == "WEBFILTER_URL_PERMITTED" OR message_tag == "WEBFILTER_URL_BLOCKED" OR message_tag == "AV_VIRUS_DETECTED_MT" OR message_tag == "CONTENT_FILTERING_BLOCKED_MT", "Juniper Unified Threat Management", "Juniper SRX")
LOOKUP-transport_for_junos_firewall_structured = juniper_transport_protocols_lookup transport_id AS protocol_id OUTPUT protocol, transport
###### JUNOS AAMW ######
[source::....junos_aamw]
sourcetype = juniper:junos:aamw:structured
EVENT_BREAKER_ENABLE = true
[juniper:junos:aamw:structured]
SHOULD_LINEMERGE = false
KV_MODE = auto
REPORT-message_tag = message_tag_for_junos_aamw
REPORT-dvc = dvc_for_junos_aamw
REPORT-score_for_severity = score_for_severity_junos_aamw
FIELDALIAS-file_hash = sample_sha256 AS file_hash
FIELDALIAS-session_id = session_id_32 AS session_id
FIELDALIAS-src = source_address AS src
FIELDALIAS-src_ip = source_address AS src_ip
FIELDALIAS-src_host = hostname AS src_host
FIELDALIAS-src_port = source_port AS src_port
FIELDALIAS-user = username AS user
FIELDALIAS-vendor_action = action AS vendor_action
EVAL-action = case(action=="PERMIT" OR action=="ALLOW" OR message_tag=="AAMW_HOST_INFECTED_EVENT_LOG", "allowed", action=="BLOCK" OR action=="DENY", "blocked", true(), action)
EVAL-app = "junos_aamw"
EVAL-category = coalesce(file_category, reason)
EVAL-dest = case(message_tag == "AAMW_ACTION_LOG", destination_address, message_tag == "AAMW_HOST_INFECTED_EVENT_LOG", source_address)
EVAL-dest_ip = case(message_tag == "AAMW_ACTION_LOG", destination_address, message_tag == "AAMW_HOST_INFECTED_EVENT_LOG", source_address)
EVAL-dest_port = case(message_tag == "AAMW_ACTION_LOG", destination_port, message_tag == "AAMW_HOST_INFECTED_EVENT_LOG", source_port)
EVAL-dvc = coalesce(dvc, host)
EVAL-ids_type = "network"
EVAL-protocol_id = case(message_tag == "AAMW_HOST_INFECTED_EVENT_LOG", 6, true(), protocol_id)
EVAL-severity = case((verdict_number >= 2 AND verdict_number < 4) OR (score >= 1 AND score < 4), "low", (verdict_number >= 4 AND verdict_number < 6) OR (score >= 4 AND score < 7), "medium", (verdict_number >= 6 AND verdict_number < 9) OR (score >= 7 AND score < 9), "high", (verdict_number >= 9 AND verdict_number <= 10) OR (score >= 9 AND score <= 10), "critical", (verdict_number > 0 AND verdict_number < 2) OR true(), "informational")
EVAL-signature = coalesce(malware_info, reason)
EVAL-vendor_product = "Juniper Advanced Anti-malware"
LOOKUP-transport_for_junos_aamw_structured = juniper_transport_protocols_lookup transport_id AS protocol_id OUTPUT transport
###### JUNOS SECINTEL ######
[source::....junos_secintel]
sourcetype = juniper:junos:secintel:structured
EVENT_BREAKER_ENABLE = true
[juniper:junos:secintel:structured]
SHOULD_LINEMERGE = false
KV_MODE = auto
REPORT-message_tag = message_tag_for_junos_secintel
REPORT-dvc = dvc_for_junos_secintel
FIELDALIAS-dest = destination_address AS dest
FIELDALIAS-dest_ip = destination_address as dest_ip
FIELDALIAS-dest_port = destination_port as dest_port
FIELDALIAS-dest_zone = destination_zone_name as dest_zone
FIELDALIAS-signature = policy_name as signature
FIELDALIAS-session_id = session_id_32 as session_id
FIELDALIAS-src = source_address AS src
FIELDALIAS-src_ip = source_address as src_ip
FIELDALIAS-src_port = source_port as src_port
FIELDALIAS-src_zone = source_zone_name as src_zone
FIELDALIAS-user = username as user
FIELDALIAS-vendor_action = action AS vendor_action
EVAL-action = case(action=="PERMIT" OR action=="ALLOW", "allowed", action=="BLOCK" OR action=="DENY", "blocked", true(), action)
EVAL-category = if(isnotnull(sub_category), category + " " + sub_category, category)
EVAL-dvc = coalesce(dvc, host)
EVAL-ids_type = "network"
EVAL-severity = case(threat_severity >= 1 AND threat_severity < 4, "low", threat_severity >= 4 AND threat_severity < 7, "medium", threat_severity >= 7 AND threat_severity < 9, "high", threat_severity >= 9 AND threat_severity <= 10, "critical", true(), "informational")
EVAL-vendor_product = "Juniper Security Intelligence"
LOOKUP-transport_for_junos_secintel_structured = juniper_transport_protocols_lookup transport_id AS protocol_id OUTPUT transport
###### JUNOS SNMP ######
[source::....junos_snmp]
sourcetype = juniper:junos:snmp
EVENT_BREAKER_ENABLE = true
[juniper:junos:snmp]
SHOULD_LINEMERGE = false
KV_MODE = auto
REPORT-auto_kv_for_snmp_link_up_down_fields = auto_kv_for_snmp_link_up_down_fields
FIELDALIAS-dvc = host AS dvc
FIELDALIAS-object = interface_name AS object
FIELDALIAS-object_id = interface_name AS object_id
FIELDALIAS-dest = host AS dest