Software Secure Workload
Activity Configure

Handling NSEL Events

The following table shows how various NSEL events are handled by Secure Firewall connector. For more information about these elements, see IP Flow Information Export (IPFIX) Entities document.

Flow Event Element ID: 233 Element Name: NF_F_FW_EVENT

Extended Flow Event Element ID: 33002 Element Name: NF_F_FW_EXT_EVENT

Action on Secure Firewall connector

0 (default, ignore this value)

Don’t care

No op

1 (Flow created)

Don’t care

Send flow to Secure Workload

2 (Flow deleted)

> 2000 (indicates the termination reason)

Send flow to Secure Workload

3 (Flow denied)

1001 (denied by ingress ACL)

Send flow with disposition marked as rejected to Secure Workload

1002 (denied by egress ACL)

1003 (denied connection by ASA interface or denied ICMP(v6) to device)

1004 (first packet on TCP is not SYN)

4 (Flow alert)

Don’t care

No op

5 (Flow updated)

Don’t care

Send flow to Secure Workload

Based on the NSEL record, Secure Firewall connector sends flow observation to Secure Workload. NSEL flow records are bidirectional. So, Secure Firewall connector sends 2 flows: forward flow and reverse flow to Secure Workload.

Here are the details about flow observation sent by Secure Firewall connector to Secure Workload.

Forward Flow observation

Field

NSEL Element ID

NSEL Element Name

Protocol

4

NF_F_PROTOCOL

Source Address

8

NF_F_SRC_ADDR_IPV4

27

NF_F_SRC_ADDR_IPV6

Source Port

7

NF_F_SRC_PORT

Destination Address

12

NF_F_DST_ADDR_IPV4

28

NF_F_DST_ADDR_IPV6

Destination Port

11

NF_F_DST_PORT

Flow Start Time

152

NF_F_FLOW_CREATE_TIME_MSEC

Byte Count

231

NF_F_FWD_FLOW_DELTA_BYTES

Packet Count

298

NF_F_FWD_FLOW_DELTA_PACKETS

Reverse Flow Information

Field

NSEL Element ID

NSEL Element Name

Protocol

4

NF_F_PROTOCOL

Source Address

12

NF_F_DST_ADDR_IPV4

28

NF_F_DST_ADDR_IPV6

Source Port

11

NF_F_DST_PORT

Destination Address

8

NF_F_SRC_ADDR_IPV4

27

NF_F_SRC_ADDR_IPV6

Destination Port

7

NF_F_SRC_PORT

Flow Start Time

152

NF_F_FLOW_CREATE_TIME_MSEC

Byte Count

232

NF_F_REV_FLOW_DELTA_BYTES

Packet Count

299

NF_F_REV_FLOW_DELTA_PACKETS

NAT

If the client to ASA flow is NATed, NSEL flow records indicate the NATed IP/port on the server side. Secure Firewall connector uses this information to stitch server to ASA and ASA to client flows.

Here is the NATed flow record in the forward direction.

Field

NSEL Element ID

NSEL Element Name

Protocol

4

NF_F_PROTOCOL

Source Address

225

NF_F_XLATE_SRC_ADDR_IPV4

281

NF_F_XLATE_SRC_ADDR_IPV6

Source Port

227

NF_F_XLATE_SRC_PORT

Destination Address

226

NF_F_XLATE_DST_ADDR_IPV4

282

NF_F_XLATE_DST_ADDR_IPV6

Destination Port

228

NF_F_XLATE_DST_PORT

Flow Start Time

152

NF_F_FLOW_CREATE_TIME_MSEC

Byte Count

231

NF_F_FWD_FLOW_DELTA_BYTES

Packet Count

298

NF_F_FWD_FLOW_DELTA_PACKETS

The forward flow will be marked as related to the NATed flow record in the forward direction (and vice versa)

Here is the NATed flow record in the reverse direction

Field

NSEL Element ID

NSEL Element Name

Protocol

4

NF_F_PROTOCOL

Source Address

226

NF_F_XLATE_DST_ADDR_IPV4

282

NF_F_XLATE_DST_ADDR_IPV6

Source Port

228

NF_F_XLATE_DST_PORT

Destination Address

225

NF_F_XLATE_SRC_ADDR_IPV4

281

NF_F_XLATE_SRC_ADDR_IPV6

Destination Port

227

NF_F_XLATE_SRC_PORT

Flow Start Time

152

NF_F_FLOW_CREATE_TIME_MSEC

Byte Count

232

NF_F_REV_FLOW_DELTA_BYTES

Packet Count

299

NF_F_REV_FLOW_DELTA_PACKETS

The reverse flow will be marked as related to the NATed flow record in the reverse direction (and vice versa).


 

Only NSEL element IDs listed in this section are supported by Secure Firewall connector.

TCP Flags Heuristics

The NSEL records do not have TCP flags information. The Secure Firewall connector uses the following heuristics to set the TCP flags so that the flows can be further analyzed by automatic policy discovery:

  • If there are at least one forward packets, adds SYN to the forward flow TCP flags.

  • If there are at least two forward packets and one reverse packet, adds ACK to the forward flow TCP flags and SYN-ACK to the reverse flow TCP flags.

  • If the previous condition holds true and the flow event is Flow deleted, adds FIN to both forward and reverse TCP flags.