Hub
Network

Network Firewall (Vendor-Agnostic)

Vendor-agnostic firewall — ECS-normalized traffic flow decisions, session lifecycle, NAT translations, and IDS/IPS threat detections. Plug into any SIEM pipeline without vendor lock-in.

Quick Start

uv tool install eventum-generator
git clone https://github.com/eventum-generator/content-packs.git
cd content-packs
eventum generate \
  --path generators/network-firewall/generator.yml \
  --id fw \
  --live-mode true

Event Types

Event IDDescriptionFrequencyCategory
traffic-allowedPermitted connection through firewall~53%network
traffic-deniedConnection rejected with RST/unreachable~13%network
session-startStateful session establishment~11%network
session-endSession teardown with counters~10%network
traffic-droppedSilently dropped (default deny)~9%network
nat-translationSource/destination NAT event~3%network
threat-detectedIDS/IPS signature match~1%intrusion_detection
system-eventDevice operational eventsrareconfiguration

Realism Features

  • Correlated sessions — session-start events consumed by session-end with matching 5-tuple
  • NAT tracking — outbound sessions carry source NAT details through session lifecycle
  • Zone-aware routing — trust/untrust/dmz zones with correct interface mappings per direction
  • Direction-specific behavior — denied/dropped traffic predominantly inbound; allowed mostly outbound
  • 15 IDS/IPS signatures across SQL injection, brute force, C2, exploits
  • Session end reasons — tcp-fin (50%), aged-out (20%), tcp-rst (25%), policy-deny (5%)

Sample Output

{
    "@timestamp": "2026-02-21T12:00:01.234567+00:00",
    "event": {
        "action": "allow",
        "category": ["network"],
        "dataset": "firewall.traffic",
        "outcome": "success",
        "type": ["connection", "allowed"]
    },
    "source": { "ip": "10.1.1.30", "port": 52341 },
    "destination": { "ip": "142.250.80.46", "port": 443 },
    "network": {
        "application": "ssl",
        "direction": "outbound",
        "transport": "tcp"
    },
    "observer": { "hostname": "fw-01", "type": "firewall", "vendor": "Generic" },
    "rule": { "name": "Allow-HTTPS-Out" }
}

Parameters

ParameterDefaultDescription
hostnamefw-01Firewall hostname
domainexample.comDomain for FQDN
serial_numberFW00A1B2C3D4Firewall serial number
nat_ip198.51.100.1Public NAT IP
agent_ide4f8c1a2-...Filebeat agent ID
agent_version8.17.0Filebeat version

Related Generators