Maybe this is more an r/s-question. Anyone able to shed some light on this?

Short story: when blocking traffic on a router-interface with access-group
and the deny-statement has the log option, most of the blocked traffic is
logged with a periodic interval and does not include individual port
numbers. But my gut feeling is that sometimes the log output displays the
actual port-numers instead of zeros and I cant really define when and why.
Please see below.

Br Jimmy

---------- Forwarded message ----------
From: Jimmy Larsson <[email protected]>
Date: 2010/7/8
Subject: Re: [OSL | CCIE_Security] IOS interface access-list blocking what?
To: Pieter-Jan Nefkens <[email protected]>
Cc: OSL Security <[email protected]>


PJ!

You are so right. These log messages comes periodically. I left the console
untouched for a while and examined the output. It turns out that it logs
each every 5 minutes per src-dst-pair per protocol to summarize them. Look
at these entries and their time stamps:

*Jul  8 08:23:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
192.168.1.203(0) -> 192.168.1.255(0), 10 packets
*Jul  8 08:28:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
192.168.1.203(0) -> 192.168.1.255(0), 10 packets
*Jul  8 08:33:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
192.168.1.203(0) -> 192.168.1.255(0), 10 packets

*Jul  8 08:23:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
192.168.1.50(0) -> 255.255.255.255(0), 20 packets
*Jul  8 08:28:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
192.168.1.50(0) -> 255.255.255.255(0), 20 packets
*Jul  8 08:33:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
192.168.1.50(0) -> 255.255.255.255(0), 20 packets
*Jul  8 08:38:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
192.168.1.50(0) -> 255.255.255.255(0), 20 packets


I guess this can be tuned with the ip access-list log commands. I have tried
tweaking them abit but so far I havent been able to make the router log each
and every denied packet (which, i guess, is when we actually see individual
ports for each packet).

R1(config)#ip access-list log-update ?
  threshold  Set access-list logging threshold

R1(config)#ip access-list logging ?
  hash-generation  Enable syslog hash code generation
  interval         Set access list logging interval

Anyone?


2010/7/8 Pieter-Jan Nefkens <[email protected]>

Hi jimmy, and others,
>
> A bit of guessing here, but you should be able to verify it..
>
> Could it be, that just like the ips, the log messages are rate limited and
> are escalating on ip-level to reduce the number of log messages and thus not
> overload the router / control plane? Just like ips signatures can be
> summarized to limit the number of events?
>
> I mean, we have the option for rate-limiting the log messages, this could
> be an internal escalation sort of level to not log individual packets if
> there's too much logging, but escalates to source and destination ip
> address.
>
> You could test it with a router and start to generate more traffic..
>
> Just an idea..
>
> Pieter-Jan
>
> Sent from my iPad
>
> On 8 jul. 2010, at 08:59, Jimmy Larsson <[email protected]> wrote:
>
> I dont get it. A few minutes later my log entries starts to look like this:
>
> *Jul  8 07:03:40.147: %SEC-6-IPACCESSLOGP: list FW denied udp
> 192.168.1.51(1645) -> 192.168.1.61(1645), 1 packet
> *Jul  8 07:03:48.483: %SEC-6-IPACCESSLOGP: list FW denied udp
> 192.168.1.203(17500) -> 255.255.255.255(17500), 1 packet
>
> And this, the very same outside to inside telnet-attempt as in my last
> email:
>
> *Jul  8 07:05:11.691: %SEC-6-IPACCESSLOGP: list FW denied tcp
> 192.168.1.52(4229) -> 192.168.169.2(23), 1 packet
>
> Please help me explain why...
>
> /J
>
> 2010/7/8 Jimmy Larsson < <[email protected]>[email protected]>
>
>> Guys
>>
>> How do you guys handle this situation? You have a router with an inbound
>> acl in outside interface that is blocking things:
>>
>> interface FastEthernet0
>>  descr Outside interface
>>  ip address 192.168.1.61 255.255.255.0
>>  ip access-group FW in
>> !
>> ip access-list extended FW
>>  deny   ip any any log
>> !
>>
>> No inspection, no zbfw, nothing. The problem is that the log-entry in the
>> access-list doesnt show me enough details of what is being blocked.
>>
>> A few examples:
>>
>> Return traffic for outbound radius:
>> *Jul  8 06:55:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
>> 192.168.1.51(0) -> 192.168.1.255(0), 8 packets
>>
>> Telnet traffic from outside host to inside router:
>> *Jul  8 06:56:56.567: %SEC-6-IPACCESSLOGP: list FW denied tcp
>> 192.168.1.52(0) -> 192.168.169.2(0), 1 packet
>>
>> Garbage broadcast from a windows-host on outside:
>> *Jul  8 06:58:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
>> 192.168.1.50(0) -> 192.168.1.255(0), 11 packets
>>
>> How do I find out port details about the blocked traffic so that I can
>> open them up (or not)? I know, it looks different when doing inspections.
>>
>> /J
>>
>> --
>> -------
>> Jimmy Larsson
>> Ryavagen 173
>> s-26030 Vallakra
>> Sweden
>> <http://blogg.kvistofta.nu>http://blogg.kvistofta.nu
>> -------
>>
>
>
>
> --
> -------
> Jimmy Larsson
> Ryavagen 173
> s-26030 Vallakra
> Sweden
> <http://blogg.kvistofta.nu>http://blogg.kvistofta.nu
> -------
>
> _______________________________________________
>
> For more information regarding industry leading CCIE Lab training, please
> visit <http://www.ipexpert.com>www.ipexpert.com
>
>


-- 
-------
Jimmy Larsson
Ryavagen 173
s-26030 Vallakra
Sweden
http://blogg.kvistofta.nu
-------



-- 
-------
Jimmy Larsson
Ryavagen 173
s-26030 Vallakra
Sweden
http://blogg.kvistofta.nu
-------
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to