Splunk® App for PCI Compliance

Installation and Configuration Manual

Acrobat logo Download manual as PDF


This documentation does not apply to the most recent version of Splunk® App for PCI Compliance. For documentation on the most recent version, go to the latest release.
Acrobat logo Download topic as PDF

Firewall Rule Activity

This report provides a six month view of firewall rule usage to help identify unneeded, outdated, or incorrect rules. This report ensures that all rules allow only authorized services and ports that match business justifications. Compliance managers might run this report more frequently to avoid unnecessary risks and avoid opening potential security holes.

Relevant data sources

Relevant data resources include firewalls that produce rule ID information.

How to configure this report

  1. Index the firewall activity data that includes a rule ID in Splunk platform.
  2. Map the data to the following Common Information Model fields: action, dvc, rule, transport, src, dest. CIM-compliant add-ons for these data sources perform this step for you.
  3. Tag the data with "network" and "communicate".

CIM-compliant add-ons for these data sources perform this step for you.

Report description

The data in the Firewall Rule Activity report is populated by the Network - Communication Rule Tracker - Lookup Gen, a lookup that runs against the communication_rule_tracker CSV file. This file is created by the Network - Communication Rule Tracker - Lookup Gen lookup. Review the lookup generating search to learn more about the search schedule and time range.

Useful searches for troubleshooting

Verify that... Search/Action Expected Result
Firewall data has been indexed in Splunk platform. tag=network tag=communicate
or `communicate`
Returns data from your network device(s).
The data fields are normalized to the CIM. `communicate` | table _time,host,sourcetype,action,dvc,
rule,transport,src,src_port,dest,dest_port,vendor_product
Each field contains the correct, expected data.
The communication rule tracker is populated. | inputlookup append=t communication_rule_tracker
or | `communication_rule_tracker`
Returns data in communication_rule_tracker.

Additional Information

The communication rule tracker file is located at $SPLUNK_HOME/etc/apps/SA-NetworkProtection/lookups.

Last modified on 25 October, 2016
PREVIOUS
Reports in the Splunk App for PCI Compliance
  NEXT
Network Traffic Activity

This documentation applies to the following versions of Splunk® App for PCI Compliance: 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.1.0, 3.1.1, 3.1.2, 3.1.3, 3.2.0, 3.2.1, 3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.4.0, 3.4.1, 3.4.2, 3.5.0, 3.6.0, 3.6.1, 3.7.0, 3.7.1, 3.7.2, 3.8.0, 3.8.1, 4.0.0, 4.0.1, 4.1.0, 4.1.1, 4.3.0, 4.4.0, 4.4.1, 4.5.0 Cloud only, 4.6.0, 4.6.2


Was this documentation topic helpful?


You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters