Skip to main content
Skip table of contents

Impacted Interface

The network port or interface which was affected by the activity (for example, target or server).

Data Type

String

Aliases

UseAlias

Client Console Full Name

Interface (Impacted)

Client Console Short Name

Not applicable

Web Console Tab/Name

Interface (Impacted)

Elasticsearch Field Name

impactedInterface

Rule Builder Column Name

DInterface

Regex Pattern

<dinterface>

NetMon Name

Not applicable

Field Relationships

  • SIP
  • SIPv4
  • SIPv6
  • SIPv6E
  • Origin Hostname
  • Origin Hostname or IP
  • Origin NAT IP
  • DIP
  • DIPv4
  • DIPv6
  • DIPv6E
  • Impacted Hostname
  • Impacted Hostname or IP
  • Impacted NAT IP
  • Origin Port
  • Origin NAT Port
  • Impacted Port
  • Impacted NAT Port
  • Origin MAC Address
  • Impacted MAC Address
  • Impacted Interface
  • Origin Domain
  • Impacted Domain
  • Origin Login
  • Impacted Account
  • IANA Protocol Number
  • IANA Protocol Name

Common Applications

  • Switches
  • Firewalls
  • Network equipment

Use Case

Troubleshooting connectivity.

MPE/Data Masking Manipulations

Not applicable.

Usage Standards

  • Impacted is Server (In Client-Server Model).
  • Impacted is Target (In Attacker-Target Model).
  • If you have more than just a port number (for example, a switch ID), capture full interface name including switch ID.
  • A Wireless Access Point can be an interface.

Examples

  • Aerohive Access Point

05 28 2013 18:38:30 1.1.1.1 <LOC6:INFO> ah_auth: Notify driver to disassoc 2222:cccc:ffff from wifi1.3

Disassociation of client from access point where the AP is impacted server. The client-server (origin-impacted) relationship applies.

  • FortiGate

02 25 2010 13:56:25 1.1.1.1 <LOC5:ALRT> date=2010-02-25 time=13:56:25 devname=FG3222222222 device_id=FG22222222222 log_id=0419016384 type=ips subtype=signature pri=alert fwver=040003 severity=critical carrier_ep="N/A" profile="scan" src=1.1.1.1 dst=1.1.1.1 src_int="port1" dst_int="port2" policyid=48 serial=1514122225 status=detected proto=6 service=2612/tcp vd="root" count=1 src_port=80 dst_port=2612 attack_id=107347979 sensor="all_default" ref="http://Host1/ids/VID107347979" user="N/A" group="N/A" incident_serialno=128862693 msg="http_decoder: HTTP.Request.Smuggling"

Firewall log showing a signature detection with interface destination (impacted). In this case, the destination (impacted) is represented as destination from the Firewall perspective.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.