Event
Administrator
Event Correlation
Audit Log
Event Policy
Cluster
External Network
Cluster Member
Internal Network
Configure
IPS
Cooperative Enforcement
Log
Correlation Unit
Log Server
Custom Report
Management Server
Database
Network
DLP
Policy
Software Blade
Predefined Report
Remote Access VPN
System Counter
Report
Traffic
VPN
Security Cluster
Security Gateway
VPN Tunnel
Security Management Server
Security Policy
SmartConsole
SmartEvent Server
https://<Server IP>/smartview/ <Server
IP>
https://
https://
$RTDIR/scripts/SmartEvent_R80_change_dbsync_mode.sh
cpstart
cpconfig
(2) Administrator
\Global
$RTDIR/scripts/SmartEvent_R80_change_dbsync_mode.sh
cpstart
$INDEXERDIR/log_indexer_custom_settings.conf
:lea_port (< >)
cpstop
$FWDIR/conf/fwopsec.conf
lea_server auth_port < >
lea_server port 0
cpstart
access_list
$RTDIR/smartview/conf
$RTDIR/scripts/stopSmartView
$RTDIR/scripts/startSmartView
# evstop
$INDEXERDIR/log_indexer -days_to_index
< >
days_to_index
# evstart
<log file name>.log* $FWDIR/log
https:// /smartview/
cover-company-logo.png
$RTDIR/smartview/conf
https:// /smartview/
https:// /smartview/
https:// /SmartView/
type:Session
layer_uuid_rule_uuid:*_<UID>
layer_uuid_rule_uuid:*_46f0ee3b-026d-45b0-b7f0-5d71f6d8eb10
Selecting Query Fields
Selecting Criteria from Grid Columns
Manually Entering Query Criteria
[ :]
[ :] AND|OR|NOT [ :] ...
source:<X> Source:<X>
"John Doe"
"Log Out"
"VPN-1 Embedded Connector"
IP Addresses
NOT Values
NOT <field>:<value>
NOT src:10.0.4.10
Log Queries
severity
app_risk
protection
protection_type
confidence_level
action
blade product
destination dst
origin orig
service
source src
user
<field name>:<values>
rule:7.1
"Block Credit Cards"
source:192.168.2.1
action:(Reject OR Block)
blade:"application control" AND action:block
192.168.2.133 10.19.136.101
192.168.2.133 OR 10.19.136.101
(blade:Firewall OR blade:IPS OR blade:VPN) AND NOT action:drop
AND NOT
source:(192.168.2.1 OR 192.168.2.2) AND destination:17.168.8.2
17.168.8.2
fwsyslog_enable
# fw ctl set int fwsyslog_enable 1
echo fwsyslog_enable=1 >> $FWDIR/modules/fwkern.conf
# fw ctl set int fwsyslog_enable 0
$FWDIR/modules/fwkern.conf
fwsyslog_enable=0
fwsyslog_enable
[Expert@host:0]# fw ctl get int fwsyslog_enable
[Expert@host:0]# fw -i ctl get size
fwsyslog_nlogs_counter
fwsyslog_nlogs_counter = 21
# fw ctl zdebug
# fw ctl set size fwsyslog_print_counter 1
;[cpu_2];[fw4_0];Number of logs sent from instance 0 is 43;
;[cpu_2];[fw4_0];Number of logs sent from instance 1 is 39;
;[cpu_2];[fw4_0];Number of logs sent from instance 2 is 50;
;[cpu_2];[fw4_0];Total fwsyslog_nlogs_counter = 132;
[Expert@host:0]# fw ctl get int fwsyslog_enable
[Expert@host:0]# fw -i ctl get size
fwsyslog_nlogs_counter
fwsyslog_nlogs_counter = 21
# fw ctl zdebug
# fw ctl set size fwsyslog_print_counter 1
;[cpu_2];[fw4_0];Number of logs sent from instance 0 is 43;
;[cpu_2];[fw4_0];Number of logs sent from instance 1 is 39;
;[cpu_2];[fw4_0];Number of logs sent from instance 2 is 50;
;[cpu_2];[fw4_0];Total fwsyslog_nlogs_counter = 132;
https:// /smartview/
https:// /smartview/
[seam_event_table_field]
send_snmp
$CPDIR/lib/snmp/
DisplayString
(Name: Check Point administrator credential guessing; RuleID:
{F182D6BC-A0AA-444a-9F31-C0C22ACA2114}; Uuid:
<42135c9c,00000000,2e1510ac,131c07b6>; NumOfUpdates: 0; IsLast: 0;
StartTime: 16Feb2015 16:45:45; EndTime: Not Completed; DetectionTime:
16Feb2015 16:45:48; LastUpdateTime: 0; TimeInterval: 600;
MaxNumOfConnections: 3; TotalNumOfConnections: 3; DetectedBy:
2886735150;
Origin: (IP: 192.0.2.4; repetitions: 3; countryname: United States;
hostname: theHost) ; ProductName: SmartDashboard; User: XYZ; Source:
(hostname: theHost; repetitions: 3; IP: 192.0.2.4; countryname: United
States) ; Severity: Critical; EventNumber: EN00000184; State: 0;
NumOfRejectedConnections: 0; NumOfAcceptedConnections: 0) ;
Any
Any
fw sam fw sam_policy
[Expert@MGMT:0]# sam_alert [-v] [-o] [-s <SAM Server>] [-t <Time>] [-f
<Security Gateway>] [-C] {-n|-i|-I} {-src|-dst|-any|-srv}
-v fw sam
-o
-s < >
-t < >
-f < >
-C
-n
-i
-I
-src
-dst
-any
-srv
[Expert@MGMT:0]# sam_alert -v2 [-v] [-O] [-S <SAM Server>] [-t <Time>] [-f
<Security Gateway>] [-n <Name>] [-c "<Comment">] [-o <Originator>] [-l {r |
a}] -a {d | r| n | b | q | i} [-C] {-ip |-eth} {-src|-dst|-any|-srv}
-v2
-v fw sam
-O
-S < >
-t < >
-f < >
-n < >
-c "< >"
-o < >
sam_alert
-l {r | a}
r
a
None
-a {d | r| n | b | q |
i}
d
r
n
b
q
i
-C
-ip
-eth
-src
-dst
-any
-srv
threshold_config
threshold_config
$FWDIR/conf/thresholds.conf
threshold_config
threshold_config,
threshold_config
Configure Global Alert Settings
Configure Alert Destinations
Configure Thresholds
Completing the Configuration
cpwd_admin
cpwd_admin stop -name CPD -path "$CPDIR/bin/cpd_admin" -command
"cpd_admin stop"
cpwd_admin start -name CPD -path "$CPDIR/bin/cpd" -command
"cpd"
Creating a Custom Gateway Status View
Creating a Custom Traffic View
Creating a Custom Counters View
Creating a Custom Tunnel View
Creating a Custom Users View
cpstat
cpstat [-d] [-h <Host>] [-p <Port>] [-s <SICname>] [-f <Flavor>] [-o <Polling
Interval> [-c <Count>] [-e <Period>]] <Application Flag>
-d
-h < >
< >
localhost
-p < >
-s < >
-f < >
< > cpstat
-o <
>
-c < >
cpstat os -f perf -o 2
-c < >
-o < >
< >
< >
< >
< >
cpstat os -f perf -o 2 -c 2
-e < >
-o < >
-c < >
cpstat os -f perf -o 2 -c 2 -e 60
< >
os
persistency
thresholds
threshold_config
ci
https_inspection
cvpn
fw
vsx
vpn
blades
identityServer
appi
urlf
dlp
ctnt
antimalware
threat-emulation
scrub
gx
fg
ha
polsrv
ca
mg
cpsemd
cpsead
ls
PA
--------------------------------------------------------------
|Flag |Flavours |
--------------------------------------------------------------
|os |default, ifconfig, routing, routing6, |
| |memory, old_memory, cpu, disk, perf, |
| |multi_cpu, multi_disk, raidInfo, sensors, |
| |power_supply, hw_info, all, average_cpu, |
| |average_memory, statistics, updates, |
| |licensing, connectivity, vsx |
--------------------------------------------------------------
|persistency |product, TableConfig, SourceConfig |
--------------------------------------------------------------
|thresholds |default, active_thresholds, destinations, |
| |error |
--------------------------------------------------------------
|ci |default |
--------------------------------------------------------------
|https_inspection |default, hsm_status, all |
--------------------------------------------------------------
|cvpn |cvpnd, sysinfo, products, overall |
--------------------------------------------------------------
|fw |default, interfaces, policy, perf, hmem, |
| |kmem, inspect, cookies, chains, |
| |fragments, totals, totals64, ufp, http, |
| |ftp, telnet, rlogin, smtp, pop3, sync, |
| |log_connection, all |
--------------------------------------------------------------
|vsx |default, stat, traffic, conns, cpu, all, |
| |memory, cpu_usage_per_core |
--------------------------------------------------------------
|vpn |default, product, IKE, ipsec, traffic, |
| |compression, accelerator, nic, |
| |statistics, watermarks, all |
--------------------------------------------------------------
|blades |fw, ips, av, urlf, vpn, cvpn, aspm, dlp, |
| |appi, anti_bot, default, |
| |content_awareness, threat-emulation, |
| |default |
--------------------------------------------------------------
|identityServer |default, authentication, logins, ldap, |
| |components, adquery |
--------------------------------------------------------------
|appi |default, subscription_status, |
| |update_status, RAD_status, top_last_hour, |
| |top_last_day, top_last_week, |
| |top_last_month |
--------------------------------------------------------------
|urlf |default, subscription_status, |
| |update_status, RAD_status, top_last_hour, |
| |top_last_day, top_last_week, |
| |top_last_month |
--------------------------------------------------------------
|dlp |default, dlp, exchange_agents, fingerprint|
--------------------------------------------------------------
|ctnt |default |
--------------------------------------------------------------
|antimalware |default, scanned_hosts, scanned_mails, |
| |subscription_status, update_status, |
| |ab_prm_contracts, av_prm_contracts, |
| |ab_prm_contracts, av_prm_contracts |
--------------------------------------------------------------
|threat-emulation |default, general_statuses, update_status, |
| |scanned_files, malware_detected, |
| |scanned_on_cloud, malware_on_cloud, |
| |average_process_time, emulated_file_size, |
| |queue_size, peak_size, |
| |file_type_stat_file_scanned, |
| |file_type_stat_malware_detected, |
| |file_type_stat_cloud_scanned, |
| |file_type_stat_cloud_malware_scanned, |
| |file_type_stat_filter_by_analysis, |
| |file_type_stat_cache_hit_rate, |
| |file_type_stat_error_count, |
| |file_type_stat_no_resource_count, |
| |contract, downloads_information_current, |
| |downloading_file_information, |
| |queue_table, history_te_incidents, |
| |history_te_comp_hosts |
--------------------------------------------------------------
|scrub |default, subscription_status, |
| |threat_extraction_statistics |
--------------------------------------------------------------
|gx |default, contxt_create_info, |
| |contxt_delete_info, contxt_update_info, |
| |contxt_path_mng_info, GXSA_GPDU_info, |
| |contxt_initiate_info, gtpv2_create_info, |
| |gtpv2_delete_info, gtpv2_update_info, |
| |gtpv2_path_mng_info, gtpv2_cmd_info, all |
--------------------------------------------------------------
|fg |all |
--------------------------------------------------------------
|ha |default, all |
--------------------------------------------------------------
|polsrv |default, all |
--------------------------------------------------------------
|ca |default, all, cert, crl, user |
--------------------------------------------------------------
|mg |default |
--------------------------------------------------------------
|cpsemd |default |
--------------------------------------------------------------
|cpsead |default |
--------------------------------------------------------------
|ls |default |
--------------------------------------------------------------
|PA |default |
--------------------------------------------------------------
[Expert@MyGW:0]# cpstat -f interfaces fw
Network interfaces
--------------------------------------------------------------------------------------------------
------------------
|Name|IP |Netmask |Flags|Peer name|Remote IP|Topology|Proxy name|Slaves|Ports|IPv6
Address|IPv6 Len|
--------------------------------------------------------------------------------------------------
------------------
|eth0|192.168.30.40|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth1| 172.30.60.80|255.255.255.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth2| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth3| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth4| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth5| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth6| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
|eth7| 0.0.0.0| 0.0.0.0| 0| | 0.0.0.0| 4| | | |
::| 0|
--------------------------------------------------------------------------------------------------
------------------
[Expert@MyGW:0]#
[Expert@MyGW:0]# cpstat -f default fw
Policy name: MyGW_Policy
Install time: Wed May 23 18:14:32 2018
Interface table
---------------------------------------
|Name|Dir|Total |Accept|Deny |Log|
---------------------------------------
|eth0|in | 2393126| 32589| 2360537| 52|
|eth0|out| 33016| 33016| 0| 0|
|eth1|in | 2360350| 0| 2360350| 0|
|eth1|out| 0| 0| 0| 0|
|eth2|in | 2360350| 0| 2360350| 0|
|eth2|out| 0| 0| 0| 0|
|eth3|in | 2348704| 0| 2348704| 1|
|eth3|out| 0| 0| 0| 0|
|eth4|in | 2360350| 0| 2360350| 0|
|eth4|out| 0| 0| 0| 0|
---------------------------------------
| | |11855896| 65605|11790291| 53|
---------------------------------------
... ... [truncated for brevity] ... ...
[Expert@MyGW:0]#
[Expert@MyGW:0]# cpstat os -f perf -o 2 -c 2 -e 60
Total Virtual Memory (Bytes): 12417720320
Active Virtual Memory (Bytes): 3741331456
Total Real Memory (Bytes): 8231063552
Active Real Memory (Bytes): 3741331456
Free Real Memory (Bytes): 4489732096
Memory Swaps/Sec: -
Memory To Disk Transfers/Sec: -
CPU User Time (%): 0
CPU System Time (%): 0
CPU Idle Time (%): 100
CPU Usage (%): 0
CPU Queue Length: -
CPU Interrupts/Sec: 135
CPUs Number: 8
Disk Servicing Read\Write Requests Time: -
Disk Requests Queue: -
Disk Free Space (%): 61
Disk Total Free Space (Bytes): 12659716096
Disk Available Free Space (Bytes): 11606188032
Disk Total Space (Bytes): 20477751296
Total Virtual Memory (Bytes): 12417720320
Active Virtual Memory (Bytes): 3741556736
Total Real Memory (Bytes): 8231063552
Active Real Memory (Bytes): 3741556736
Free Real Memory (Bytes): 4489506816
Memory Swaps/Sec: -
Memory To Disk Transfers/Sec: -
CPU User Time (%): 3
CPU System Time (%): 0
CPU Idle Time (%): 97
CPU Usage (%): 3
CPU Queue Length: -
CPU Interrupts/Sec: 140
CPUs Number: 8
Disk Servicing Read\Write Requests Time: -
Disk Requests Queue: -
Disk Free Space (%): 61
Disk Total Free Space (Bytes): 12659716096
Disk Available Free Space (Bytes): 11606188032
Disk Total Space (Bytes): 20477751296
[Expert@MyGW:0]#
WinEventToCPLog
WinEventToCPLog
WinEventToCPLog
WinEventToCPLog
WinEventToCPLog -s
WinEventToCPLog
WinEventToCPLog
C:\Program Files\CheckPoint\WinEventToCPLog\R65\bin
C:\Program files (x86)
windowEventToCPLog -pull_cert
C:\Program Files\CheckPoint\WinEventToCPLog\R65\bin
C:\Program files (x86)
GetRequest
GetNextRequest GetBulkRequest
SetReques sysContact
sysLocation sysName set
cp_log_export add name [domain-server ] target-
server target-port protocol <(udp|tcp)> format
<(syslog)|(cef)> [optional arguments]
$EXPORTERDIR/targets/ .
apply-now
cp_log_export [command-arguments]
cp_log_export help
openssl genrsa -out RootCA.key 2048
openssl req -x509 -new -nodes -key RootCA.key -days 2048 -out
RootCA.pem
Country Name (2 letter code) [AU]:US
State or Province Name (full name) [Some-State]:New York
Locality Name (eg, city) []:MyCity
Organization Name (eg, company) [Internet Widgits Pty Ltd]:MyCompany
Organizational Unit Name (eg, section) []:MyDepartment
Common Name (e.g. server FQDN or YOUR name) []:www.company.com
Email Address []:
openssl genrsa -out log_exporter.key 2048
openssl req -new -key log_exporter.key -out log_exporter.csr
penssl x509 -req -in log_exporter.csr -CA RootCA.pem -CAkey
RootCA.key -CAcreateserial -out log_exporter.crt -days 2048 -sha256
openssl pkcs12 -inkey log_exporter.key -in log_exporter.crt -export -
out log_exporter.p12
log_exporter
mdsenv
cd $EXPORTERDIR/targets/
mkdir certs
RootCA.pem log_exporter.p12
RootCA.pem log_exporter.p12
chmod +r RootCA.pem
chmod +r log_exporter.p12
targetConfiguration.xml
openssl genrsa -out syslogServer.key 2048
openssl req -new -key syslogServer.key -out syslogServer.csr
openssl x509 -req -in syslogServer.csr -CA RootCA.pem -CAkey
RootCA.key -CAcreateserial -out syslogServer.crt -days 2048 -sha256
$EXPORTERDIR/targets/ .
EXPORTERDIR
mdsenv
$EXPORTERDIR/targets//targetConfiguration.xml
$FWDIR/log/
All [default] / log /
audit
true,
false,
<exported>true</exporte
d>)
true,
orig
escaped
elg
false
true,
syslog-ng
openssl pkcs12 -inkey syslogServer.key -in syslogServer.crt -export -out
syslog-ng.p12 -name "syslogng-alias" -password pass:changeit
ARCSIGHT_HOME/current/bin/arcsight agent keytoolgui
$ARCSIGHT_HOME/current/jre/lib/security/cacerts (password
"changeit").
Ca.pem
vi $ARCSIGHT_HOME//current/user/agent/agent.properties
syslogng.mutual.auth.enabled=false -> true
syslogng.tls.keystore.file=user/agent/syslog-ng.p12
syslogng.tls.keystore.alias=syslogng-alias
/etc/init.d/arc_connector_name restart
cat syslogServer.crt syslogServer.key RootCA.pem > splunk.pem
inputs.conf
vi /opt/splunk/etc/apps/search/local/inputs.conf
[SSL]
serverCert = /etc/ssl/my-certs/splunk.pem
sslPassword =
requireClientCert = true
[tcp-ssl:// ]
index =
server.conf
vi /opt/splunk/etc/system/local/server.conf
[sslConfig]
sslRootCAPath = /etc/ssl/my-certs/RootCA.pem
/opt/splunk/bin/splunk restart
source s_network { network(transport("tcp") port(514)
flags(syslog-protocol) ); };
TIME_FORMAT = %s
TIME_PREFIX = time=
MAX_TIMESTAMP_LOOKAHEAD = 15
: (
:command (
:cmd_name (include)
:file_name ("snortPolicy.C")
)
)
:filename ("snort_dict.ini")
cpstop cpstart fwd –n
cmd_name
command arguments
on_success
on_fail
:command (
:cmd_name (try)
:try_arguments
.
.
:on_success (
:command()
)
:on_fail (
:command()
)
)
try
parse_from start_position
last_position
regexp
add_field
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+)")
:add_field (
:type (index)
:field_name (Src)
:field_type (ipaddr)
:field_index (1)
)
)
([0-9]+\.[0-9]+\.[0-
9]+\.[0-9]+) parse_from (start_position)
group_try
try_all
try_all_successively
try_until_success
try_until_fail
group_try
%PIX-6-605004: Login denied from 194.29.40.24/4813 to
outside:192.168.35.15/ssh for user 'root'
:command (
:cmd_name (group_try)
:mode (try_all_successively)
:(
# A "try" command for the source.
:command ()
)
:(
# A "try" command for the destination.
:command ()
)
:(
# A "try" command for the user.
:command ()
)
.
.
.
)
group_try
try_all
try_all_successively
group_try
:command (
:cmd_name (group_try)
:mode (try_until_success)
:(
:command (
.
.
.
:regexp ("(\(|)(login|su)(\)|).* session (opened|closed) for
user ([a-z,A-Z,0-9]*)")
)
)
:(
:command (
.
.
.
:regexp ("(\(|)su(\)|).* authentication failure; logname=([a-zA-Z0-9]*).*
user=([a-zA-Z0-9]*)")
)
)
.
.
.
)
try try
until success
:cmd_name (group_try)
:mode (try_until_success)
: (
….
)
field_name
case
default
:command (
:cmd_name (switch)
:field_name (msgID)
:(
:case (302005)
:command ()
)
:(
:case (302001)
:case (302002)
:command ()
)
:default (
:command()
)
)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (product)
:field_type (string)
:field_value ("Antivirus")
)
)
unconditional_try
message
:command (
:cmd_name (switch)
:field_name (msgID)
(
:case (106017)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (message)
:field_type (string_id)
:field_value ("LAND Attack")
)
)
)
:(
:case (106020)
:command (
:cmd_name (unconditional_try)
:add_field (
:type (const)
:field_name (message)
:field_type (string_id)
:field_value ("Teardrop Attack")
)
)
)
.
.
.
)
file_name
:command (
:cmd_name (include)
:file_name ("c:\freeTextParser\device\antivirusPolicy.C")
)
add_field
add_field
field_index
field_index
field_value
Field_name
Src
Dst
proto
s_port
product
service
Action
ifname
User
Field_type
int
uint
string
ipaddr
pri
timestmp
time
string_id
action
ifdir
ifname
protocol
port
Src
Dst
proto
s_port
service
Action
ifname
field_index field_value
field_index field_value
field_index
field_index
:command (
:cmd_name (try)
:parse_from (last_position)
:regexp ("Failed password for ([a-zA-Z0-9]+) from
([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+) port ([0-9]+)")
:add_field (
:type (index)
:field_name (User)
:field_type (string)
:field_index (1)
)
:add_field (
:type (index)
:field_name (Src)
:field_type (ipaddr)
:field_index (2)
)
:add_field (
:type (index)
:field_name (port)
:field_type (port)
:field_index (3)
)
)
[a-zA-Z0-9]+
field_index [0-9]+\.[0-9]+\.[0-9]+\.[0-
9]+
on_success
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("access-list (.*) (permitted|denied|est-allowed)
([a-zA-Z0-9_\([a-zA-Z0-9_\\.[0-9]+\.[0-9]+\.[0-9]+)\(([0-9]*)\) -> ")
:add_field (
:type (index)
:field_name (listID)
:field_type (string)
:field_index (1)
)
:add_field (
:type (index)
:field_name (action)
:field_type (action)
:field_index (2)
)
:add_field (
:type (index)
:field_name (proto)
:field_type (protocol)
:field_index (3)
)
:add_field (
:type (index)
:field_name (ifname)
:field_type (ifname)
:field_index (4)
)
:add_field (
:type (index)
:field_name (Src)
:field_type (ipaddr)
:field_index (5)
)
:on_success (
:command (
:cmd_name (try)
:parse_from (last_position)
:regexp
("([a-zA-Z0-9_\\.[0-9]+\.[0-9]+\.[0-9]+)\(([0-9]*)\) hit-cnt ([0-9]+) ")
:add_field (
:type (index)
:field_name (destination_interface)
:field_type (string)
:field_index (1)
)
)
)
)
field_value
:command (
:cmd_name (try)
:parse_from (last_position)
:regexp ("%PIX-([0-9])-([0-9]*)"))
:add_field (
:type (const)
:field_name (product)
:field_type (string_id)
:field_value ("CISCO PIX")
)
)
Dict_name
.ini ini
[dictionary_name]
Name1 = val1
Name2 = val2
cisco_action] [3com_action]
permitted = accept Permit = accept
denied = reject Deny = reject
:command (
:cmd_name (try)
:parse_from (start_position)
:regexp ("list (.*) (permitted|denied) (icmp)
([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+) -> ([0-9]+\.[0-9]+\.[0-9]+\.[0-9]+).* packet")
:add_field (
:type (index)
:field_name (action)
:field_type (action)
:field_index (2)
:dict_name (cisco_action)