Introduction

The Cisco Event Streamer (also known as eStreamer) allows you to stream Firepower System events to external client applications. You can stream host, discovery, correlation, compliance white list, intrusion, user activity, file, malware, and connection data from a Management Center and you can stream intrusion data from 7000 and 8000 series devices.

Note that eStreamer is not supported on NGIPSv, Firepower Services, Firepower Threat Defense Virtual, and Firepower Threat Defense. To stream events from these devices, you can configure eStreamer on the Management Center that the device reports to.

eStreamer uses a custom application layer protocol to communicate with connected client applications. As the purpose of eStreamer is simply to return data that the client requests, the majority of this guide describes the eStreamer formats for the requested data.

There are three major steps to creating and integrating an eStreamer client with a Firepower System:

1.blank.gif Write a client application that exchanges messages with the Management Center or managed device using the eStreamer application protocol. The eStreamer SDK includes a reference client application.

2.blank.gif Configure a Management Center or device to send the required type of events to your client application.

3.blank.gif Connect your client application to the Management Center or device and begin exchanging data.

This guide provides the information you need to successfully create and run an eStreamer Version 6.0 client application.

Major Changes in eStreamer Version 6.0

If you are upgrading your Firepower System deployment to Version 6.0, please note the following changes, some of which may require you to update your eStreamer client:

blank.gif Added Name Description Mapping Data Block to map ID numbers to names and descriptions.

blank.gif Added SSL Rule ID to provide information about SSL rules.

blank.gif Added User Record to provide information on user names and detection.

blank.gif Added Endpoint Profile Data Block for 6.0+ to provide information about connection endpoints.

blank.gif Added Access Control Policy Name Data Block to provide information about access control policy names.

  • Added the following metadata records:

blank.gif Realm Metadata for 6.0+

blank.gif Security Group Metadata for 6.0+

blank.gif Sinkhole Metadata for 6.0+

blank.gif Netmap Domain Metadata for 6.0+

blank.gif Filelog Storage Metadata for 6.0+

blank.gif Filelog Sandbox Metadata for 6.0+

blank.gif Filelog Spero Metadata for 6.0+

blank.gif Filelog Archive Metadata for 6.0+

blank.gif Filelog Static Analysis Metadata for 6.0+

blank.gif File Policy Name for 6.0+

  • Replaced the following blocks:

blank.gif Replaced Malware Event Data Block 5.4.x with Malware Event Data Block 6.0+ to add an HTTP Response field.

blank.gif Replaced User Information Data Block for 5.x with User Information Data Block for 6.0+ to add endpoint profile, Security Intelligence, and IPv6 fields.

blank.gif Replaced User Login Information Data Block 5.1-5.4.x with User Login Information Data Block 6.0+ to add endpoint profile and Security Intelligence fields.

blank.gif Replaced File Event for 5.4.x with File Event for 6.0+ to add fields for file analysis, local malware analysis, and capacity handling statuses.

blank.gif Replaced Connection Statistics Data Block 5.4.1 with Connection Statistics Data Block 6.0+ to add HTTP response, DNS, sinkhole, and Security Intelligence fields.

blank.gif Replaced Access Control Policy Rule Reason Data Block with Access Control Policy Rule Reason Data Block for 6.0+ to increase the Reason field from 16 bits to 32.

blank.gif Replaced Intrusion Event Record 5.4.x with Intrusion Event Record 6.0+ to add an HTTP Response field.

Using this Guide

At the highest level, the eStreamer service is a mechanism for streaming data from the Firepower System to a requesting client. The service can stream the following categories of data:

  • Intrusion event data and event extra data
  • Correlation (compliance) event data
  • Discovery event data
  • User event data
  • Metadata for events
  • Host information
  • Malware event data

Descriptions of the data structures returned by eStreamer make up the majority of this book. The chapters in the book are:

  • Understanding the eStreamer Application Protocol, which provides an overview of eStreamer communications, details some of the requirements for writing eStreamer client applications, and describes the four types of messages used to send commands to and receive data from the eStreamer service.
  • Understanding Intrusion and Correlation Data Structures, which documents the data formats used to return event data generated by the intrusion detection and correlation components and the data formats used to represent the intrusion and correlation events.
  • Understanding Discovery & Connection Data Structures, which documents the data formats used to return discovery, user, and connection event data.
  • Understanding Host Data Structures, which documents the data formats that eStreamer uses to return full host information data when it receives a host information request message.
  • Configuring eStreamer, which documents how to configure the eStreamer on a Management Center or managed device. The chapter also documents the eStreamer command-line switches and provides instructions for manually starting and stopping the eStreamer service and for configuring the Management Center or managed device to start eStreamer automatically.
  • Data Structure Examples, which provides examples of eStreamer message packets in binary format.
  • Understanding Legacy Data Structures, which documents the structure of legacy data structures that are no longer in use by the currently shipping product but may be used by older clients.

Prerequisites

To understand the information in this guide, you should be familiar with the features and nomenclature of the Firepower System and the function of its components in general, and with the different types of event data these components generate in particular. Definitions of unfamiliar or product-specific terms can frequently be obtained from the Firepower eStreamer Integration Guide.

Product Versions for Firepower System Releases

Version numbers are used throughout this guide to describe the data format for events generated by the Management Center and managed devices. The Firepower System Product Versions table lists versions for each product by major release.

 

Table 1-1 Firepower System Product Versions

Release
Management Center Version
Managed Device Version

3D System 5.0

Management Center 5.0

5.0

3D System 5.1

Management Center 5.1

5.1

3D System 5.1.1

Management Center 5.1.1

5.1.1

3D System 5.2

Management Center 5.2

5.2

3D System 5.3

Management Center 5.3

5.3

Firepower System 5.3.1

Management Center 5.3.1

5.3.1

Firepower System 5.4

Management Center 5.4

5.4

Firepower System 6.0

Management Center 6.0

6.0

Document Conventions

The eStreamer Message Data Type Conventions table lists the names used in this book to describe the various data field formats employed in eStreamer messages. Numeric constants used by the eStreamer service are typically unsigned integer values. Bit fields use low-order bits unless otherwise noted. For example, in a one-byte field containing five bits of flag data, the low-order five bits will contain the data.

 

Table 1-2 eStreamer Message Data Type Conventions

Data Type
Description

nn-bit field

Bit field of nn bits

byte

8-bit byte containing data of arbitrary format

int8

Signed 8-bit byte

uint8

Unsigned 8-bit byte

int16

Signed 16-bit integer

uint16

Unsigned 16-bit integer

int32

Signed 32-bit integer

uint32

Unsigned 32-bit integer

uint64

Unsigned 64-bit integer

string

Variable length field containing character data

[n]

Array subscript following any of the above data types to indicate n instances of the indicated data type, for example, uint8[4]

variable

Collection of various data types

BLOB

Binary object of unspecified type, typically raw data as captured from a packet

IP Addresses

The Cisco database stores IPv4 and IPv6 addresses in the same fields in a BINARY format. To get IPv6 addresses, convert to hex notation, for example: 20010db8000000000000000000004321. The database follows the RFC for storing IPv4 addresses by filling in bits 80-95 with 1’s, which yields an invalid IPv6 address. For example, the IPv4 address 10.5.15.1 would be stored as 00000000000000000000FFFF0A050F01.