I'm here to help :-)

--
Marko Milivojevic - CCIE #18427
Senior Technical Instructor - IPexpert

Mailto: [email protected]
Telephone: +1.810.326.1444
Fax: +1.810.454.0130
Community: http://www.ipexpert.com/communities

:: Sent from my phone. Apologies for errors and brevity. ::

On Jul 12, 2010, at 11:49, Jimmy Larsson <[email protected]> wrote:

> Nope, didnt even know about that command. Looks like something I will keep in 
> my toolbox for troubleshooting issues. Thanks, Marco!
> 
> /J
> 
> 2010/7/9 Marko Milivojevic <[email protected]>
> Have you tried enablind IP accounting for access violations? That
> should help in this case.
> 
> --
> Marko Milivojevic - CCIE #18427
> Senior Technical Instructor - IPexpert
> 
> YES! We include 400 hours of REAL rack
> time with our Blended Learning Solution!
> 
> Mailto: [email protected]
> Telephone: +1.810.326.1444
> Fax: +1.810.454.0130
> Web: http://www.ipexpert.com/
> 
> On Thu, Jul 8, 2010 at 18:01, Jimmy Larsson <[email protected]> wrote:
> > Maybe this is more an r/s-question. Anyone able to shed some light on this?
> > Short story: when blocking traffic on a router-interface with access-group
> > and the deny-statement has the log option, most of the blocked traffic is
> > logged with a periodic interval and does not include individual port
> > numbers. But my gut feeling is that sometimes the log output displays the
> > actual port-numers instead of zeros and I cant really define when and why.
> > Please see below.
> > Br Jimmy
> >
> > ---------- Forwarded message ----------
> > From: Jimmy Larsson <[email protected]>
> > Date: 2010/7/8
> > Subject: Re: [OSL | CCIE_Security] IOS interface access-list blocking what?
> > To: Pieter-Jan Nefkens <[email protected]>
> > Cc: OSL Security <[email protected]>
> >
> >
> > PJ!
> > You are so right. These log messages comes periodically. I left the console
> > untouched for a while and examined the output. It turns out that it logs
> > each every 5 minutes per src-dst-pair per protocol to summarize them. Look
> > at these entries and their time stamps:
> > *Jul  8 08:23:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
> > 192.168.1.203(0) -> 192.168.1.255(0), 10 packets
> > *Jul  8 08:28:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
> > 192.168.1.203(0) -> 192.168.1.255(0), 10 packets
> > *Jul  8 08:33:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
> > 192.168.1.203(0) -> 192.168.1.255(0), 10 packets
> > *Jul  8 08:23:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
> > 192.168.1.50(0) -> 255.255.255.255(0), 20 packets
> > *Jul  8 08:28:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
> > 192.168.1.50(0) -> 255.255.255.255(0), 20 packets
> > *Jul  8 08:33:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
> > 192.168.1.50(0) -> 255.255.255.255(0), 20 packets
> > *Jul  8 08:38:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
> > 192.168.1.50(0) -> 255.255.255.255(0), 20 packets
> >
> > I guess this can be tuned with the ip access-list log commands. I have tried
> > tweaking them abit but so far I havent been able to make the router log each
> > and every denied packet (which, i guess, is when we actually see individual
> > ports for each packet).
> > R1(config)#ip access-list log-update ?
> >   threshold  Set access-list logging threshold
> > R1(config)#ip access-list logging ?
> >   hash-generation  Enable syslog hash code generation
> >   interval         Set access list logging interval
> > Anyone?
> >
> > 2010/7/8 Pieter-Jan Nefkens <[email protected]>
> >>
> >> Hi jimmy, and others,
> >> A bit of guessing here, but you should be able to verify it..
> >> Could it be, that just like the ips, the log messages are rate limited and
> >> are escalating on ip-level to reduce the number of log messages and thus 
> >> not
> >> overload the router / control plane? Just like ips signatures can be
> >> summarized to limit the number of events?
> >> I mean, we have the option for rate-limiting the log messages, this could
> >> be an internal escalation sort of level to not log individual packets if
> >> there's too much logging, but escalates to source and destination ip
> >> address.
> >> You could test it with a router and start to generate more traffic..
> >> Just an idea..
> >> Pieter-Jan
> >> Sent from my iPad
> >> On 8 jul. 2010, at 08:59, Jimmy Larsson <[email protected]> wrote:
> >>
> >> I dont get it. A few minutes later my log entries starts to look like
> >> this:
> >> *Jul  8 07:03:40.147: %SEC-6-IPACCESSLOGP: list FW denied udp
> >> 192.168.1.51(1645) -> 192.168.1.61(1645), 1 packet
> >> *Jul  8 07:03:48.483: %SEC-6-IPACCESSLOGP: list FW denied udp
> >> 192.168.1.203(17500) -> 255.255.255.255(17500), 1 packet
> >> And this, the very same outside to inside telnet-attempt as in my last
> >> email:
> >> *Jul  8 07:05:11.691: %SEC-6-IPACCESSLOGP: list FW denied tcp
> >> 192.168.1.52(4229) -> 192.168.169.2(23), 1 packet
> >> Please help me explain why...
> >> /J
> >> 2010/7/8 Jimmy Larsson <[email protected]>
> >>>
> >>> Guys
> >>> How do you guys handle this situation? You have a router with an inbound
> >>> acl in outside interface that is blocking things:
> >>> interface FastEthernet0
> >>>  descr Outside interface
> >>>  ip address 192.168.1.61 255.255.255.0
> >>>  ip access-group FW in
> >>> !
> >>> ip access-list extended FW
> >>>  deny   ip any any log
> >>> !
> >>> No inspection, no zbfw, nothing. The problem is that the log-entry in the
> >>> access-list doesnt show me enough details of what is being blocked.
> >>> A few examples:
> >>> Return traffic for outbound radius:
> >>> *Jul  8 06:55:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
> >>> 192.168.1.51(0) -> 192.168.1.255(0), 8 packets
> >>> Telnet traffic from outside host to inside router:
> >>> *Jul  8 06:56:56.567: %SEC-6-IPACCESSLOGP: list FW denied tcp
> >>> 192.168.1.52(0) -> 192.168.169.2(0), 1 packet
> >>> Garbage broadcast from a windows-host on outside:
> >>> *Jul  8 06:58:41.035: %SEC-6-IPACCESSLOGP: list FW denied udp
> >>> 192.168.1.50(0) -> 192.168.1.255(0), 11 packets
> >>> How do I find out port details about the blocked traffic so that I can
> >>> open them up (or not)? I know, it looks different when doing inspections.
> >>> /J
> >>> --
> >>> -------
> >>> Jimmy Larsson
> >>> Ryavagen 173
> >>> s-26030 Vallakra
> >>> Sweden
> >>> http://blogg.kvistofta.nu
> >>> -------
> >>
> >>
> >>
> >> --
> >> -------
> >> Jimmy Larsson
> >> Ryavagen 173
> >> s-26030 Vallakra
> >> Sweden
> >> http://blogg.kvistofta.nu
> >> -------
> >>
> >> _______________________________________________
> >> For more information regarding industry leading CCIE Lab training, please
> >> visit www.ipexpert.com
> >
> >
> >
> > --
> > -------
> > Jimmy Larsson
> > Ryavagen 173
> > s-26030 Vallakra
> > Sweden
> > http://blogg.kvistofta.nu
> > -------
> >
> >
> >
> > --
> > -------
> > Jimmy Larsson
> > Ryavagen 173
> > s-26030 Vallakra
> > Sweden
> > http://blogg.kvistofta.nu
> > -------
> >
> > _______________________________________________
> > For more information regarding industry leading CCIE Lab training, please
> > visit www.ipexpert.com
> >
> >
> 
> 
> 
> -- 
> -------
> Jimmy Larsson
> Ryavagen 173
> s-26030 Vallakra
> Sweden
> http://blogg.kvistofta.nu
> -------
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to