<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How does one create an output filter to exclude IPv4 indicators in a CIDR range? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/194285#M97602</link>
    <description>&lt;P&gt;&amp;gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;whitelist some IPs from the indicators extraced from syslog?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;While not excluding them at the time of extract.&amp;nbsp; Not all feeds should have these whitelist entries excluded from their final output.&lt;/P&gt;</description>
    <pubDate>Mon, 08 Jan 2018 15:44:28 GMT</pubDate>
    <dc:creator>EdwinD</dc:creator>
    <dc:date>2018-01-08T15:44:28Z</dc:date>
    <item>
      <title>How does one create an output filter to exclude IPv4 indicators in a CIDR range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/192646#M97597</link>
      <description>&lt;P&gt;I have various miners.&amp;nbsp; &amp;nbsp;Various miners are connected to various aggregators which are inturn connected in various ways to different types of output.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Some of these miners receive RFC1918 IPv4 indicators.&amp;nbsp; &amp;nbsp;These are aggregated and send to outputs.&amp;nbsp; &amp;nbsp;I'm attempted to have one output which will contain these RFC1918 addresses while another does not.&amp;nbsp; &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've created a new prototype based off of&amp;nbsp;&lt;SPAN&gt;minemeld.ft.redis.RedisSet accepting only indicator types IPv4.&amp;nbsp; &amp;nbsp;The config includes this:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;store_value: true&lt;BR /&gt;whitelist_prefixes:&lt;BR /&gt;- wl&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I cloned it and pointed it to clone of processor stdlib.aggregatorIPv4Outbound.&amp;nbsp; &amp;nbsp;The input for this processor includes my wlWhiteListIPv4 as well as my miner.&amp;nbsp; This wlWhiteListIPv4 node has manual indicators which include RFC1918 CIDR blocks along with one IP address (for testing.)&amp;nbsp; &amp;nbsp;This, it includes 10.0.0.0/8 as well as a single host within that range.&amp;nbsp;&amp;nbsp;&lt;/SPAN&gt;It appears to me that while the single host works in this case, the CIDR does not.&amp;nbsp;&amp;nbsp;&amp;nbsp;With two nearly identical outputs configured where&amp;nbsp;one is&amp;nbsp; using the whitelist and another not, I see this single host&amp;nbsp;only in the later output.&amp;nbsp; &amp;nbsp;However, other hosts in the 10.0.0.0/8 CIDR are in both.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;How do I go about adding a miner with CIDRs as a whitelist to an output node?&amp;nbsp; &amp;nbsp; While in my example above I'm talking about RFC1918 addresses, there are additional cases where I want to exclude from certain output nodes the ranges collected from a miner.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 01:39:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/192646#M97597</guid>
      <dc:creator>EdwinD</dc:creator>
      <dc:date>2017-12-21T01:39:15Z</dc:date>
    </item>
    <item>
      <title>Re: How does one create an output filter to exclude IPv4 indicators in a CIDR range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/192740#M97598</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/23926"&gt;@EdwinD&lt;/a&gt; : It is working in my case. Are you using a miner based on the 'localdb.Miner' to host the RFC1928 CIDR ranges?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Dec 2017 16:11:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/192740#M97598</guid>
      <dc:creator>xhoms</dc:creator>
      <dc:date>2017-12-21T16:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: How does one create an output filter to exclude IPv4 indicators in a CIDR range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/192946#M97599</link>
      <description>&lt;P&gt;No, although I do have a WildFireEvent miner cloned from localDB as per the article "&lt;SPAN&gt;Using-MineMeld-as-a-Incident-Response-Platform".&amp;nbsp; &amp;nbsp;Is localDB what I should be using?&amp;nbsp; &amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="col-sm-12 col-md-12"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Fri, 22 Dec 2017 23:07:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/192946#M97599</guid>
      <dc:creator>EdwinD</dc:creator>
      <dc:date>2017-12-22T23:07:29Z</dc:date>
    </item>
    <item>
      <title>Re: How does one create an output filter to exclude IPv4 indicators in a CIDR range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/192949#M97600</link>
      <description>&lt;P&gt;I believe I see what I had wrong.&amp;nbsp; &amp;nbsp; Because I hwave whitelist_prefixes set to wl, the processor name itself must also begin with wl.&amp;nbsp; I had only named the miner begining with wl.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So, I configured a processor with a name begining with wl and bound it to two inputs, the wl miner containing my RFC1918 addresses along with my syslog+7 days miner.&amp;nbsp; This worked.&amp;nbsp; &amp;nbsp;Within this same config I have an identical processer with the exception of the name, it does not start with wl.&amp;nbsp; The output node is identical except it points to this processor.&amp;nbsp; This one has the RFC1918 addresses.&amp;nbsp; &amp;nbsp;The point being that with only the name of the processor changing I can see the whitelist working.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think the following is the relevant config.&amp;nbsp; &amp;nbsp;I have 300+&amp;nbsp; lines in the config ATM, so I'm not posting it all.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The end result in this case is that I have PanOS syslog output feeding into MineMeld while whitelisting RFC1918 addresses.&amp;nbsp; Longer term I could use external dynamic IPv4 lists, such as a list of CloudFlare addresses,&amp;nbsp; as a feed into a whitelist that I aggregate against the PanOS syslog entries to generate output feeds that I can use in specific dynamic PanOS firewall rules.&amp;nbsp; After enough hits from an IP, if it isn't on a known list, completely block that IP at every&amp;nbsp;firewall at all locations for a period of time.&amp;nbsp; This is just one example of many I'm considering.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;  syslogMiner7Days:
    inputs: []
    output: true
    prototype: minemeldlocal.syslogMiner7Days
  aggregatorIPv4GenericStaticWhiteList:
    inputs:
      - wlWhiteListIPv4
    output: true
    prototype: stdlib.aggregatorIPv4Generic
  wlWhiteListIPv4:
    inputs: []
    output: true
    prototype: stdlib.listIPv4Generic
  localSyslog7Days:
    inputs:
      - syslogMiner7Days
      - wlWhiteListIPv4
    output: true
    prototype: stdlib.localSyslog
  wlListIPv4Generic-testingWhiteList20171222b:
    inputs:
      - wlWhiteListIPv4
      - syslogMiner7Days
    output: true
    prototype: stdlib.aggregatorIPv4Generic
  feedIPv4TestingWhiteList:
    inputs:
      - wlListIPv4Generic-testingWhiteList20171222b
    output: false
    prototype: minemeldlocal.feedIPv4TestingWhiteList&lt;/PRE&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 23 Dec 2017 01:55:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/192949#M97600</guid>
      <dc:creator>EdwinD</dc:creator>
      <dc:date>2017-12-23T01:55:08Z</dc:date>
    </item>
    <item>
      <title>Re: How does one create an output filter to exclude IPv4 indicators in a CIDR range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/193057#M97601</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/23926"&gt;@EdwinD&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;are you trying to create a feed out of MineMeld to be used as whitelist? or would you like to whitelist some IPs from the indicators extraced from syslog?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;luigi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Dec 2017 08:02:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/193057#M97601</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2017-12-26T08:02:17Z</dc:date>
    </item>
    <item>
      <title>Re: How does one create an output filter to exclude IPv4 indicators in a CIDR range?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/194285#M97602</link>
      <description>&lt;P&gt;&amp;gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;whitelist some IPs from the indicators extraced from syslog?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;While not excluding them at the time of extract.&amp;nbsp; Not all feeds should have these whitelist entries excluded from their final output.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 15:44:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-does-one-create-an-output-filter-to-exclude-ipv4-indicators/m-p/194285#M97602</guid>
      <dc:creator>EdwinD</dc:creator>
      <dc:date>2018-01-08T15:44:28Z</dc:date>
    </item>
  </channel>
</rss>

