Impacted Interface
The network port or interface which was affected by the activity (for example, target or server).
Data Type
String
Aliases
| Use | Alias | 
|---|---|
Client Console Full Name  | Interface (Impacted)  | 
Client Console Short Name  | Not applicable  | 
Web Console Tab/Name  | Interface (Impacted)  | 
Elasticsearch Field Name  | impactedInterface  | 
Rule Builder Column Name  | DInterface  | 
Regex Pattern  | <dinterface>  | 
NetMon Name  | Not applicable  | 
Field Relationships
- SIP
 - SIPv4
 - SIPv6
 - SIPv6E
 - Origin Hostname
 - Origin Hostname or IP
 - Origin NAT IP
 - DIP
 - DIPv4
 - DIPv6
 - DIPv6E
 - Impacted Hostname
 - Impacted Hostname or IP
 - Impacted NAT IP
 
- Origin Port
 - Origin NAT Port
 - Impacted Port
 - Impacted NAT Port
 - Origin MAC Address
 - Impacted MAC Address
 - Impacted Interface
 - Origin Domain
 - Impacted Domain
 - Origin Login
 - Impacted Account
 - IANA Protocol Number
 - IANA Protocol Name
 
Common Applications
- Switches
 - Firewalls
 - Network equipment
 
Use Case
Troubleshooting connectivity.
MPE/Data Masking Manipulations
Not applicable.
Usage Standards
- Impacted is Server (In Client-Server Model).
 - Impacted is Target (In Attacker-Target Model).
 - If you have more than just a port number (for example, a switch ID), capture full interface name including switch ID.
 - A Wireless Access Point can be an interface.
 
Examples
- Aerohive Access Point
 
05 28 2013 18:38:30 1.1.1.1 <LOC6:INFO> ah_auth: Notify driver to disassoc 2222:cccc:ffff from wifi1.3
Disassociation of client from access point where the AP is impacted server. The client-server (origin-impacted) relationship applies.
- FortiGate
 
02 25 2010 13:56:25 1.1.1.1 <LOC5:ALRT> date=2010-02-25 time=13:56:25 devname=FG3222222222 device_id=FG22222222222 log_id=0419016384 type=ips subtype=signature pri=alert fwver=040003 severity=critical carrier_ep="N/A" profile="scan" src=1.1.1.1 dst=1.1.1.1 src_int="port1" dst_int="port2" policyid=48 serial=1514122225 status=detected proto=6 service=2612/tcp vd="root" count=1 src_port=80 dst_port=2612 attack_id=107347979 sensor="all_default" ref="http://Host1/ids/VID107347979" user="N/A" group="N/A" incident_serialno=128862693 msg="http_decoder: HTTP.Request.Smuggling"
Firewall log showing a signature detection with interface destination (impacted). In this case, the destination (impacted) is represented as destination from the Firewall perspective.