Nope, didnt even know about that command. Looks like something I will keep in my toolbox for troubleshooting issues. Thanks, Marco!
/J 2010/7/9 Marko Milivojevic <[email protected]> > Have you tried enablind IP accounting for access violations? That > should help in this case. > > -- > Marko Milivojevic - CCIE #18427 > Senior Technical Instructor - IPexpert > > YES! We include 400 hours of REAL rack > time with our Blended Learning Solution! > > Mailto: [email protected] > Telephone: +1.810.326.1444 > Fax: +1.810.454.0130 > Web: http://www.ipexpert.com/ > > On Thu, Jul 8, 2010 at 18:01, Jimmy Larsson <[email protected]> wrote: > > Maybe this is more an r/s-question. Anyone able to shed some light on > this? > > Short story: when blocking traffic on a router-interface with > access-group > > and the deny-statement has the log option, most of the blocked traffic is > > logged with a periodic interval and does not include individual port > > numbers. But my gut feeling is that sometimes the log output displays the > > actual port-numers instead of zeros and I cant really define when and > why. > > Please see below. > > Br Jimmy > > > > ---------- Forwarded message ---------- > > From: Jimmy Larsson <[email protected]> > > Date: 2010/7/8 > > Subject: Re: [OSL | CCIE_Security] IOS interface access-list blocking > what? > > To: Pieter-Jan Nefkens <[email protected]> > > Cc: OSL Security <[email protected]> > > > > > > PJ! > > You are so right. These log messages comes periodically. I left the > console > > untouched for a while and examined the output. It turns out that it logs > > each every 5 minutes per src-dst-pair per protocol to summarize them. > Look > > at these entries and their time stamps: > > *Jul 8 08:23:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp > > 192.168.1.203(0) -> 192.168.1.255(0), 10 packets > > *Jul 8 08:28:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp > > 192.168.1.203(0) -> 192.168.1.255(0), 10 packets > > *Jul 8 08:33:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp > > 192.168.1.203(0) -> 192.168.1.255(0), 10 packets > > *Jul 8 08:23:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp > > 192.168.1.50(0) -> 255.255.255.255(0), 20 packets > > *Jul 8 08:28:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp > > 192.168.1.50(0) -> 255.255.255.255(0), 20 packets > > *Jul 8 08:33:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp > > 192.168.1.50(0) -> 255.255.255.255(0), 20 packets > > *Jul 8 08:38:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp > > 192.168.1.50(0) -> 255.255.255.255(0), 20 packets > > > > I guess this can be tuned with the ip access-list log commands. I have > tried > > tweaking them abit but so far I havent been able to make the router log > each > > and every denied packet (which, i guess, is when we actually see > individual > > ports for each packet). > > R1(config)#ip access-list log-update ? > > threshold Set access-list logging threshold > > R1(config)#ip access-list logging ? > > hash-generation Enable syslog hash code generation > > interval Set access list logging interval > > Anyone? > > > > 2010/7/8 Pieter-Jan Nefkens <[email protected]> > >> > >> Hi jimmy, and others, > >> A bit of guessing here, but you should be able to verify it.. > >> Could it be, that just like the ips, the log messages are rate limited > and > >> are escalating on ip-level to reduce the number of log messages and thus > not > >> overload the router / control plane? Just like ips signatures can be > >> summarized to limit the number of events? > >> I mean, we have the option for rate-limiting the log messages, this > could > >> be an internal escalation sort of level to not log individual packets if > >> there's too much logging, but escalates to source and destination ip > >> address. > >> You could test it with a router and start to generate more traffic.. > >> Just an idea.. > >> Pieter-Jan > >> Sent from my iPad > >> On 8 jul. 2010, at 08:59, Jimmy Larsson <[email protected]> wrote: > >> > >> I dont get it. A few minutes later my log entries starts to look like > >> this: > >> *Jul 8 07:03:40.147: %SEC-6-IPACCESSLOGP: list FW denied udp > >> 192.168.1.51(1645) -> 192.168.1.61(1645), 1 packet > >> *Jul 8 07:03:48.483: %SEC-6-IPACCESSLOGP: list FW denied udp > >> 192.168.1.203(17500) -> 255.255.255.255(17500), 1 packet > >> And this, the very same outside to inside telnet-attempt as in my last > >> email: > >> *Jul 8 07:05:11.691: %SEC-6-IPACCESSLOGP: list FW denied tcp > >> 192.168.1.52(4229) -> 192.168.169.2(23), 1 packet > >> Please help me explain why... > >> /J > >> 2010/7/8 Jimmy Larsson <[email protected]> > >>> > >>> Guys > >>> How do you guys handle this situation? You have a router with an > inbound > >>> acl in outside interface that is blocking things: > >>> interface FastEthernet0 > >>> descr Outside interface > >>> ip address 192.168.1.61 255.255.255.0 > >>> ip access-group FW in > >>> ! > >>> ip access-list extended FW > >>> deny ip any any log > >>> ! > >>> No inspection, no zbfw, nothing. The problem is that the log-entry in > the > >>> access-list doesnt show me enough details of what is being blocked. > >>> A few examples: > >>> Return traffic for outbound radius: > >>> *Jul 8 06:55:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp > >>> 192.168.1.51(0) -> 192.168.1.255(0), 8 packets > >>> Telnet traffic from outside host to inside router: > >>> *Jul 8 06:56:56.567: %SEC-6-IPACCESSLOGP: list FW denied tcp > >>> 192.168.1.52(0) -> 192.168.169.2(0), 1 packet > >>> Garbage broadcast from a windows-host on outside: > >>> *Jul 8 06:58:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp > >>> 192.168.1.50(0) -> 192.168.1.255(0), 11 packets > >>> How do I find out port details about the blocked traffic so that I can > >>> open them up (or not)? I know, it looks different when doing > inspections. > >>> /J > >>> -- > >>> ------- > >>> Jimmy Larsson > >>> Ryavagen 173 > >>> s-26030 Vallakra > >>> Sweden > >>> http://blogg.kvistofta.nu > >>> ------- > >> > >> > >> > >> -- > >> ------- > >> Jimmy Larsson > >> Ryavagen 173 > >> s-26030 Vallakra > >> Sweden > >> http://blogg.kvistofta.nu > >> ------- > >> > >> _______________________________________________ > >> For more information regarding industry leading CCIE Lab training, > please > >> visit www.ipexpert.com > > > > > > > > -- > > ------- > > Jimmy Larsson > > Ryavagen 173 > > s-26030 Vallakra > > Sweden > > http://blogg.kvistofta.nu > > ------- > > > > > > > > -- > > ------- > > Jimmy Larsson > > Ryavagen 173 > > s-26030 Vallakra > > Sweden > > http://blogg.kvistofta.nu > > ------- > > > > _______________________________________________ > > For more information regarding industry leading CCIE Lab training, please > > visit www.ipexpert.com > > > > > -- ------- Jimmy Larsson Ryavagen 173 s-26030 Vallakra Sweden http://blogg.kvistofta.nu -------
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com
