Origin Interface
The network port or interface from which the activity originated (for example, attacker or client).
Data Type
String
Aliases
| Use | Alias | 
|---|---|
Client Console Full Name  | Interface (Origin)  | 
Client Console Short Name  | Not applicable  | 
Web Console Tab/Name  | Interface (Origin)  | 
Elasticsearch Field Name  | originInterface  | 
Rule Builder Column Name  | sinterface  | 
Regex Pattern  | <sinterface>  | 
NetMon Name  | Not applicable  | 
Field Relationships
- SIP
 - SIPv4
 - SIPv6
 - SIPv6E
 - Origin Hostname
 - Origin Hostname or IP
 - Origin NAT IP
 - DIP
 - DIPv4
 - DIPv6
 - DIPv6E
 - Impacted Hostname
 - Impacted Hostname or IP
 - Impacted NAT IP
 
- Origin Port
 - Origin NAT Port
 - Impacted Port
 - Impacted NAT Port
 - Origin MAC Address
 - Impacted MAC Address
 - Impacted Interface
 - Origin Domain
 - Impacted Domain
 - Origin Login
 - Impacted Account
 - IANA Protocol Number
 - IANA Protocol Name
 
Common Applications
- Switches
 - Firewalls
 - Network equipment
 
Use Case
Troubleshooting connectivity.
MPE/Data Masking Manipulations
Not applicable.
Usage Standards
- Origin is Client (In Client-Server Model).
 - Origin is Attacker (In Attacker-Target Model).
 - If you have more than just a port number (for example, a switch ID), capture full interface name including switch ID.
 - A Wireless Access Point can be an interface.
 
Examples
- FortiGate
 
02 25 2010 13:56:25 1.1.1.1 <LOC5:ALRT> date=2010-02-25 time=13:56:25 devname=FG322222222222222 device_id=FG2222222222 log_id=0419016384 type=ips subtype=signature pri=alert fwver=040003 severity=critical carrier_ep="N/A" profile="scan" src=1.1.1.1 dst=1.1.1.1 src_int="port1" dst_int="port2" policyid=48 serial=23455436 status=detected proto=6 service=2612/tcp vd="root" count=1 src_port=80 dst_port=2612 attack_id=107347979 sensor="all_default" ref="http://Host1/ids/VID107347979" user="N/A" group="N/A" incident_serialno=128862663 msg="http_decoder: HTTP.Request.Smuggling"
Firewall log showing a signature detection with interface src (origin). In this case, the possible attacker (origin) is represented as source from the Firewall perspective.
- Squid Proxy
 
2014/05/01 10:45:29| Accepting  spoofing HTTP connections at 1.1.1.1:3128, FD 14.
Connection origin showing IP and corresponding interface.
- Juniper Firewall
 
08 23 2016 09:56:43 1.1.1.1 <USER:INFO> 1 2016-08-23T14:56:42.429Z USABLDRRECFLOW01 RT_FLOW - RT_FLOW_SESSION_CREATE [junos@1.1.1.1.2.40 source-address="1.1.1.1" source-port="57101" destination-address="1.1.1.1" destination-port="443" service-name="junos-https" nat-source-address="1.1.1.1" nat-source-port="57101" nat-destination-address="1.1.1.1" nat-destination-port="443" src-nat-rule-type="static rule" src-nat-rule-name="ARUBA_RAP_WLC3600_xlate" dst-nat-rule-type="N/A" dst-nat-rule-name="N/A" protocol-id="6" policy-name="EMEA_ARUBA_GUEST_ACCESS" source-zone-name="FRONTEND_DMZ" destination-zone-name="INTERNET" session-id-32="83048" username="N/A" roles="N/A" packet-incoming-interface="reth5.0" application="UNKNOWN" nested-application="UNKNOWN" encrypted="UNKNOWN"]
Showing inbound interface in flow.
- Cisco Router
 
10 09 2016 01:59:26 1.1.1.1 <LOC7:ERRR> Original Address=1.1.1.1 39296: Oct  9 01:59:48: %ILPOWER-3-CONTROLLER_PORT_ERR: Controller port error, Interface Gi4/0/38: Power Controller reports Short detected
Parse full interface Gi4/0/38.