08-03-2023 08:32 AM
Is someone able to tell me exactly how to identify traffic that is hitting specific L3 rules?
Ive defined the local syslog server and added "Security Events" and "Appliance Event Log" to it in Network-wide>General-Reporting
I have ticked the syslog box against the rules I want to see what traffic is matching, yet nothing is getting logged to my syslog server even though the hit counts on those rules is going up.
I am getting other msgs on the syslog server from the MX ok though.
TIA
Solved! Go to Solution.
08-04-2023 05:51 AM
So if you configured flows or firewall as a tag in the syslog server configuration on Network wide -> general then you can indeed tick boxes on your L3/4 rules and when they get hit they will log to the syslog in 3 lines.
A flow start log will be made which shows the normal and translated IP addresses (can't be filtered)
A flow or firewall log that actually shows a logic match at the end so you'll have to think what ports and protocols you are matching in that rule to recognize the matched rule.
examples:
protocol=tcp sport=43958 dport=443 pattern: allow all
protocol=udp sport=54366 dport=53 pattern: Group Policy Allow
I don't have access to our logging server to show better examples right now.
A flow end log after the connection is terminated with also the NAT information like the flow start.
We log several firewalls like this and haven't had any issues with that.
08-03-2023 08:55 AM
Probably Your syslog server is misconfigured.
08-03-2023 09:02 AM
Nope, its not filtering anything, displays all the other events, just nothing from the L3 rules where I ticked the syslog box
08-03-2023 09:12 AM
Check the documentation. It's very simple to configure.
08-03-2023 09:09 AM
You need to send "flows" to syslog
And you need to select the syslog checkbox behind the firewall rule
08-03-2023 09:12 AM
That then sends absolutely everything, not just the rules where I tick the syslog box - I only want to see what is hitting the rules I have ticked the syslog box on.
08-03-2023 09:13 AM
Thats not possible.
You get the flow and hits. Or nothing
You would need to filter on the syslog server itself
08-03-2023 09:34 AM
I get the flows but I dont see any hits arriving on the syslog server for the rules I have ticked.
Unless there are just so many i cant see them, Is there anything specific you are aware of in the text that I can filter by?
08-03-2023 09:35 AM
Which syslog server are you using?
08-03-2023 09:39 AM
visual syslog
08-03-2023 09:45 AM
Maybe it will help you.
https://youtu.be/3wdYaI2D4Ow?t=159
08-04-2023 05:51 AM
So if you configured flows or firewall as a tag in the syslog server configuration on Network wide -> general then you can indeed tick boxes on your L3/4 rules and when they get hit they will log to the syslog in 3 lines.
A flow start log will be made which shows the normal and translated IP addresses (can't be filtered)
A flow or firewall log that actually shows a logic match at the end so you'll have to think what ports and protocols you are matching in that rule to recognize the matched rule.
examples:
protocol=tcp sport=43958 dport=443 pattern: allow all
protocol=udp sport=54366 dport=53 pattern: Group Policy Allow
I don't have access to our logging server to show better examples right now.
A flow end log after the connection is terminated with also the NAT information like the flow start.
We log several firewalls like this and haven't had any issues with that.
08-04-2023 07:42 AM
Thats great, many thanks.
It sends every flow to the syslog server rather than just the ones Ive ticked the syslog box for though, but not an issue (other than generating unnecessary traffic), I've just filtered on the syslog server to show those where message contains "deny"
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide