<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Logging/Viewing dropped packets on Zone-Based Firewall in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222951#M351027</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mat,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you did not have the ip inspect log drop-pkt.. Then the behavior was expected&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I encourage you to make sure you are logging to the local buffer of the FW and then try to send invalid traffic and check the logs ( U can share all of your configuration ) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 30 Apr 2013 18:08:33 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2013-04-30T18:08:33Z</dc:date>
    <item>
      <title>Logging/Viewing dropped packets on Zone-Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222948#M351024</link>
      <description>&lt;P&gt;I have a Zone-Based Firewall installation running on a 2911 router running C2900-UNIVERSALK9-M Version 15.3(1)T.&amp;nbsp; I am trying to find a way to log dropped packets to a syslog server so I can see attempted connections that were denied.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have attempted to configure the logging a couple of different ways, but with no luck so far.&amp;nbsp; Right now I have it set up like this (please note that in the config below the syslog server 192.168.1.132 is in the "inside" zone):&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;logging trap warnings&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;logging source-interface Loopback0&lt;/P&gt;&lt;P&gt;logging host 192.168.1.132&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security Transit-to-inside source Transit destination inside&lt;/P&gt;&lt;P&gt;description ** permit all traffic from Transit to inside **&lt;/P&gt;&lt;P&gt;service-policy type inspect Transit-to-inside-policy&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect Transit-to-inside-policy&lt;/P&gt;&lt;P&gt;class type inspect spiceworks-traffic-in&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;pass log&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;class type inspect CAG-portal-traffic-inbound&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;inspect dropped-to-log&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;STRONG&gt;drop log&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;zone-pair security self-to-inside source self destination inside&lt;/P&gt;&lt;P&gt;description ** permit reply traffic for mgmt on inside interface **&lt;/P&gt;&lt;P&gt;service-policy type inspect permit-any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect permit-any&lt;/P&gt;&lt;P&gt;class class-default&lt;/P&gt;&lt;P&gt;&amp;nbsp; pass&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;parameter-map type inspect global&lt;/P&gt;&lt;P&gt;alert on&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;log dropped-packets enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;log summary flows 256 time-interval 30&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;parameter-map type inspect &lt;STRONG&gt;dropped-to-log&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;audit-trail on&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;alert on&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;------------------------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Other syslog messages from the ZBF do get logged to the syslog server, so I know the basic communication works.&amp;nbsp; But I still get no syslogs of packets dropped &lt;EM&gt;because they failed to match any of the firewall rules&lt;/EM&gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;-Mathew Rouch&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:34:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222948#M351024</guid>
      <dc:creator>mat_rouch</dc:creator>
      <dc:date>2019-03-12T01:34:50Z</dc:date>
    </item>
    <item>
      <title>Re: Logging/Viewing dropped packets on Zone-Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222949#M351025</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmmm..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I mean are you really allowing all traffic across the box or are you supposed to be blocking something??&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You get logs into the server... Right???&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pleasee. tell me you have this command&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;&lt;EM&gt;&lt;STRONG&gt;ip inspect log drop-pkt&lt;/STRONG&gt;&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 04:37:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222949#M351025</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-26T04:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: Logging/Viewing dropped packets on Zone-Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222950#M351026</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am getting other logs sent to the syslog server, yes, just not the firewall-related "dropped packet" logs.&amp;nbsp; Here's an example of one that does make it through:&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------&lt;/P&gt;&lt;P&gt;5790: *Apr 30 15:05:27.039 UTC: %FW-4-TCP_OoO_SEG: Dropping TCP Segment: seq:-647534746 1500 bytes is out-of-order; expectedseq:3647406270. Reason: TCP reassembly queue overflow - session 192.168.1.179:3895 to 54.240.160.142:80 on zone-pair inside-to-Transitclass WB-Browsing&lt;/P&gt;&lt;P&gt;-----------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not allowing all the traffic across the box.&amp;nbsp; The "self-to-inside" zone-pair just allows the *firewall itself* to initiate any traffic to the inside zone.&amp;nbsp; That's temporary until I get all the management traffic to and from the firewall defined, then I will lock it down further.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;And I added the "ip inspect log drop-pkt" and it did not appear to make any difference.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any other suggestions?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Apr 2013 15:13:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222950#M351026</guid>
      <dc:creator>mat_rouch</dc:creator>
      <dc:date>2013-04-30T15:13:44Z</dc:date>
    </item>
    <item>
      <title>Logging/Viewing dropped packets on Zone-Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222951#M351027</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Mat,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So you did not have the ip inspect log drop-pkt.. Then the behavior was expected&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I encourage you to make sure you are logging to the local buffer of the FW and then try to send invalid traffic and check the logs ( U can share all of your configuration ) &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Apr 2013 18:08:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222951#M351027</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-30T18:08:33Z</dc:date>
    </item>
    <item>
      <title>Logging/Viewing dropped packets on Zone-Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222952#M351028</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I added "ip inspect log drop-pkt" and it made no difference.&amp;nbsp; Is there somewhere else I need to enable this for the logging to work properly?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;-Mat&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Apr 2013 21:21:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222952#M351028</guid>
      <dc:creator>mat_rouch</dc:creator>
      <dc:date>2013-04-30T21:21:06Z</dc:date>
    </item>
    <item>
      <title>Logging/Viewing dropped packets on Zone-Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222953#M351029</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;That's all you need....&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That is why I asked for the Show run&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 30 Apr 2013 23:15:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/2222953#M351029</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2013-04-30T23:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: Logging/Viewing dropped packets on Zone-Based Firewall</title>
      <link>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/3859981#M351030</link>
      <description>&lt;P&gt;Did you find a solution?&lt;/P&gt;</description>
      <pubDate>Tue, 21 May 2019 10:15:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/logging-viewing-dropped-packets-on-zone-based-firewall/m-p/3859981#M351030</guid>
      <dc:creator>fblackfire</dc:creator>
      <dc:date>2019-05-21T10:15:54Z</dc:date>
    </item>
  </channel>
</rss>

