ASA Netflow

  • Post author:
  • Post category:ASA / Cisco

The Cisco Secure Firewall ASA supports Netflow (Version 9), also referred to as Netflow Secure Event Logging (NSEL). NSEL provides information about network users, applications, traffic usage across the network and can help determine Denial-of-Service (DoS) attacks.

  • Netflow v9 uses templates which describes the netflow data.
  • Netflow events tracked include flow-create, flow-teardown, flow-denied and flow-update.
  • NSEL generates periodic NSEL events, called flow-update events, to provide byte counters over the duration of the flow.
  • SYSLOG messages can include the same information, these can be disabled to avoid duplication of events using the command – logging flow-export-syslogs disable.
  • NSEL Collectors are the Netflow servers that receive the flow events from the ASA. Multiple Collectors can be configured, with different flows sent to different collectors. I.e., denied flow events sent to collector A and flow creation events sent to collector B.

https://www.cisco.com/c/en/us/td/docs/security/asa/special/netflow/asa_netflow.html

Configuration

The following NSEL configuration is applied on the ASA Firewall, it is assumed the basic configuration of the ASA is already setup.

The flow export destination interface, IP address and port is defined globally.

flow-export destination INSIDE 192.168.10.101 2055

Specify the interval at which template records are sent to all configured output destinations.

flow-export template timeout-rate 1

An Access Control List is configured to specify which traffic should be matched.

access-list FLOW-DENY extended permit ip 192.168.10.0 255.255.255.0 any

access-list FLOW-ALL extended permit ip 192.168.11.0 255.255.255.0 any

Class-maps are created to match the traffic referencing the ACLs.

class-map CM-FLOW-ALL
 match access-list FLOW-ALL
!
class-map CM-FLOW-DENY
 match access-list FLOW-DENY

The default policy-map global_policy will be modified to export flows that match the class-map/ACL. Denied event traffic matching the CM-FLOW-DENY class-map and all netflow events matching CM-FLOW-ALL class-map will be sent to the flow collector.

policy-map global_policy
 class CM-FLOW-DENY
  flow-export event-type flow-denied destination 192.168.10.101
 class CM-FLOW-ALL
  flow-export event-type all destination 192.168.10.101
!
service-policy global_policy global

Disable Netflow related SYSLOG messages.

Optional disabling of netflow SYSLOG messages.

ASA(config)# show logging flow-export-syslogs
Syslog ID       Type                           Status
302013          Flow Created                   Enabled
302015          Flow Created                   Enabled
302017          Flow Created                   Enabled
302020          Flow Created                   Enabled
302014          Flow Deleted                   Enabled
302016          Flow Deleted                   Enabled
302018          Flow Deleted                   Enabled
302021          Flow Deleted                   Enabled
106015          Flow Denied                    Enabled
106023          Flow Denied                    Enabled
313001          Flow Denied                    Enabled
313008          Flow Denied                    Enabled
710003          Flow Denied                    Enabled
106100          Flow Created/Denied            Enabled

Disable netflow SYSLOG messages using the command logging flow-export-syslogs disable

ASA(config)# show logging flow-export-syslogs
Syslog ID       Type                           Status
302013          Flow Created                   Disabled
302015          Flow Created                   Disabled
302017          Flow Created                   Disabled
302020          Flow Created                   Disabled
302014          Flow Deleted                   Disabled
302016          Flow Deleted                   Disabled
302018          Flow Deleted                   Disabled
302021          Flow Deleted                   Disabled
106015          Flow Denied                    Disabled
106023          Flow Denied                    Disabled
313001          Flow Denied                    Disabled
313008          Flow Denied                    Disabled
710003          Flow Denied                    Disabled
106100          Flow Created/Denied            Disabled

Verification

From the ASA run show flow-export counters to confirm whether the ASA is sending netflow packets to the flow collector.

ASA(config)# show flow-export counters
destination: INSIDE 192.168.10.101 2055
Statistics:
packets sent                                      559
Errors:
block allocation failure                          0
invalid interface                                 0
template send failure                             0
no route to collector                             0
failed to get lock on block                       0
source port allocation failure                    0

Using PRTG Netflow tool is configured to receive netflow events from the ASA. The screenshot below confirms netflow data is received.

Selecting the top connections, we can determine flow events for traffic to/from 192.168.11.50, which matches the FLOW-ALL ACL on the ASA.

Run a packet capture to capture the netflow communication between the ASA and the collector.

From the output of a netflow packet below, we can confirm the ScrAddr is 192.168.11.50 (matching the FLOW-ALL ACL) and the Firewall Event is Flow created as well as the protocol/port information.

From the output of the netflow packet below, we can confirm the ScrAddr is 192.168.10.101 (matching the FLOW-DENY ACL), the Firewall Event is Flow denied by ingress ACL.

The Ingress ACL ID in the packet capture matches the hash of the ASA ACL combined with the hash of ACE line 1, as observed in the output below.