Splunk® App for PCI Compliance

Installation and Configuration Manual

This documentation does not apply to the most recent version of Splunk® App for PCI Compliance. For documentation on the most recent version, go to the latest release.

Network Traffic Activity

This report provides a six-month rolling view of network traffic activity between PCI domains.

This report looks at traffic data produced by firewalls, routers, switches, and any other device that produces network traffic data. You can modify and customize the report by using different filters.

Relevant data sources

Relevant data sources for this report include any device that creates network traffic activity, typically firewalls (for example, Palo Alto, Checkpoint, Cisco ASA, and so on).

How to configure this report

1. Index firewall data activity in Splunk Enterprise.

2. Map the data to the following Common Information Model fields:

 host,action,dvc,rule,transport,src,src_port,dest,dest_port,vendor_product

3. Set the category column for each asset in the Asset table to "pci" and/or "cardholder" as applicable.

4. Set the pci_domain column for each asset in the Asset table to {dmz|trust|untrust|cardholder|wireless}.

5. Set the is_secure and is_prohibited columns of the prohibited traffic list to {true|false}.

Mapping examples:

  • The action field shows either allowed or blocked traffic.
  • The eventtypes for traffic-related data are tagged with communicate and network

Report description

The data in the Network Traffic Activity report is populated by an ad hoc search that runs against the network_summary summary index. This index is created by the Network - All Communication - Summary Gen saved search, which is a post-process task of the Network - All Communication - Base saved search.

Pci-network traffic activity.png

This search runs on a 15 minute cycle and looks at 20 minutes of data.

Schedule: 5,20,35,50 * * * * Runs on a 15 offset minute window.
Report Window: -20m@m to -5m@m Looks at 15 minutes of data.

Note: The report window stops at 5 minutes ago because some data sources may not have provided complete data in a more recent time frame.

Useful searches/Troubleshooting

Troubleshooting Task Search/Action Expected Result
Verify that you have data from your network devices. sourcetype=<your_sourcetype_for_your_data> Returns data from your network devices.
Verify that network activity data has been indexed in Splunk Enterprise. tag=network tag=communicate

or `communicate`

Returns all network traffic data from your network devices.
Verify that the fields are normalized to the Common Information Model. `communicate` | fields sourcetype, action, dvc, rule, transport, src, dest Returns a list of events and the specific network traffic fields of data populated from your devices.
Verify that the summary index needed by the report is populated. `get_summary(network_summary,"Network - All Communication - Summary Gen")` Returns data in the network_summary index.

Additional information

  • The Network – Communication – Lookup Gen is a post-process task. You can find the details of this search in the $SPLUNK_HOME/etc/apps/SA-NetworkProtection/default/postprocess.conf file.
  • The Network – Communication – Summary Gen is a post-process task. You can find the details of this search in the $SPLUNK_HOME/etc/apps/SA-NetworkProtection/default/postprocess.conf file.
Last modified on 26 October, 2015
Firewall Rule Activity   Default Account Access

This documentation applies to the following versions of Splunk® App for PCI Compliance: 2.1.1


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters