History Page. Barracuda NextGen Firewall F

Similar documents
To get a feel for how to use the FIREWALL > Live page in NextGen Admin, watch the following video:

ICS 451: Today's plan

Best Practice - Protect Against TCP SYN Flooding Attacks with TCP Accept Policies

General Firewall Configuration

Status and Policy Entries

CS 356: Computer Network Architectures. Lecture 10: IP Fragmentation, ARP, and ICMP. Xiaowei Yang

ICS 351: Networking Protocols

IPv4 and IPv6 Commands

Monitoring Active and Recent Connections

K2289: Using advanced tcpdump filters

Introduction to IPv6. IPv6 addresses

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

Internet Control Message Protocol (ICMP)

Configuring IPv4. Finding Feature Information. This chapter contains the following sections:

IPv6. IPv4 & IPv6 Header Comparison. Types of IPv6 Addresses. IPv6 Address Scope. IPv6 Header. IPv4 Header. Link-Local

Packet Header Formats

HP High-End Firewalls

Access Rules. Controlling Network Access

IPv6 Protocols and Networks Hadassah College Spring 2018 Wireless Dr. Martin Land

LECTURE 8. Mobile IP

Network layer: Overview. Network layer functions IP Routing and forwarding NAT ARP IPv6 Routing

Network layer: Overview. Network Layer Functions

CPSC 826 Internetworking. The Network Layer: Routing & Addressing Outline. The Network Layer

20-CS Cyber Defense Overview Fall, Network Basics

Configuring Routes on the ACE

DDoS Testing with XM-2G. Step by Step Guide

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Command Manual Network Protocol. Table of Contents

The Internet Protocol. IP Addresses Address Resolution Protocol: IP datagram format and forwarding: IP fragmentation and reassembly

How to Configure a Remote Management Tunnel for Barracuda NG Firewalls

Different Layers Lecture 20

ICMP (Internet Control Message Protocol)

Cisco CCIE Security Written.

Chapter 4 Software-Based IP Access Control Lists (ACLs)

Using Diagnostic Tools

ipv6 hello-interval eigrp

HP High-End Firewalls

ROUTING INTRODUCTION TO IP, IP ROUTING PROTOCOLS AND PROXY ARP

Network Layer (4): ICMP

This article explains how to configure NSRP-Lite for a NS50 firewall to a single WAN.

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Network Protocol Configuration Commands

CS 457 Lecture 11 More IP Networking. Fall 2011

How to Configure an ISP with DHCP

HP Load Balancing Module

IPv6 Commands: ipv6 h to ipv6 mi

IP Protocols. ALTTC/Oct

Firewalls. Firewall. means of protecting a local system or network of systems from network-based security threats creates a perimeter of defense

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

Interconnecting Networks with TCP/IP

Configuring attack detection and prevention 1

Your Name: Your student ID number:

Introduction to IPv6. IPv6 addresses

Configuring Advanced Firewall Settings

Internetworking/Internetteknik, Examination 2G1305 Date: August 18 th 2004 at 9:00 13:00 SOLUTIONS

Introduction to IPv6. IPv6 addresses

Internet Control Message Protocol

How to Configure a Remote Management Tunnel for an F-Series Firewall

Mobile IP Support for RFC 3519 NAT Traversal

Chapter 4: outline. 4.5 routing algorithms link state distance vector hierarchical routing. 4.6 routing in the Internet RIP OSPF BGP

Network Layer: Internet Protocol

Internet protocols: ICMP, ARP, DHCP

Minimum is 128 bytes; maximum depends on the interface medium.

Router Architecture Overview

Lecture Computer Networks

TCP /IP Fundamentals Mr. Cantu

HPE FlexFabric 5940 Switch Series

ip dhcp-client network-discovery through ip nat sip-sbc

Operation Manual IPv4 Routing H3C S3610&S5510 Series Ethernet Switches. Table of Contents

Configuring IP Services

Subnets. IP datagram format. The Internet Network layer. IP Fragmentation and Reassembly. IP Fragmentation & Reassembly. IP Addressing: introduction

IP Services Volume Organization

Table of Contents 1 IP Address Configuration Commands IP Performance Configuration Commands 2-1

IPV6 SIMPLE SECURITY CAPABILITIES.

Support for policy-based routing applies to the Barracuda Web Security Gateway running version 6.x only.

Command Manual (For Soliton) IP Address-IP Performance. Table of Contents

Configuring attack detection and prevention 1

HPE 5920 & 5900 Switch Series

Internetworking - We are heterogeneity to our network (variable network technologies, bandwidth, MTU, latency, etc. etc.)

Recap. Recap. Internetworking. First mile problem. Internet. End Users. Last mile problem. Direct link networks Packet switching.

Configuring Flood Protection

Lecture 2: Basic routing, ARP, and basic IP

IPv4. Christian Grothoff.

Contents. Ping, tracert, and system debugging commands 1 debugging 1 display debugging 2 ping 2 ping ipv6 5 tracert 7 tracert ipv6 9

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Chapter 8 roadmap. Network Security

IPv6 Neighbor Discovery

Detecting Specific Threats

IPv6 Neighbor Discovery

H

Operation Manual IPv6 H3C S3610&S5510 Series Ethernet Switches Table of Contents. Table of Contents

Introduction to Internetworking

HP Load Balancing Module

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

ET4254 Communications and Networking 1

Introduction p. 1 The Need for Security p. 2 Public Network Threats p. 2 Private Network Threats p. 4 The Role of Routers p. 5 Other Security Devices

Table of Contents 1 IP Address Configuration Commands IP Performance Configuration Commands 2-1

Chapter 4: Network Layer

Routing Overview. Information About Routing CHAPTER

Transcription:

The Firewall > History page is very useful for troubleshooting. It provides information for all traffic that has passed through the Barracuda NG Firewall. It also provides messages that state why traffic was denied, blocked, dropped, or unsuccessful. You can filter the entries on the page to only list certain sessions. You can also set limits for the size of cache entries, and you can configure source and destination IP addresses to be translated to hostnames. In this article: Viewing Session Details On the Firewall > History page, the details for all sessions are listed. You can view additional details for a specific session by double-clicking it. The following information is provided for each session: AID Info Org (Origin) Interface Source 1 / 7 The access ID (AID) including an icon that indicates if the connection was successful: Red Icon Blocked connection. Green Icon Established connections. The AID also includes consecutive numbering for both blocked and established connections. For blocked connections, the AID includes the letter B. The origin, as specified by the following abbreviations: LIN Local In. The incoming traffic on the box firewall. LOUT Local Out. The outgoing traffic from the box firewall. LB Loopback. The traffic via the loopback interface. FWD Forwarding. The outbound traffic via the forwarding firewall. IFWD Inbound Forwarding. The inbound traffic to the firewall. PXY Proxy. The outbound traffic via the proxy. IPXY Inbound Proxy. The inbound traffic via the proxy. TAP Transparent Application Proxying. The traffic via stream forwarding. LRD Local Redirect. Redirected traffic configured in forwarding ruleset. The incoming interface. The source IP address of the requesting client. Destination The IP address of the requested destination. Proto Port Service Count Last Rule Info User MAC The protocol that was used. For example, TCP, UDP, and ICMP. The port of the requested destination. The assigned (dynamic) service. The number of tries. The length of time that has passed since the last connection attempt. The name of the matching rule. A message indicating why the session failed or was denied, blocked, or dropped. For more details on these messages, see the s Overview. An TF-sync entry indicates that the session is synced. This entry appears the backup machine when the firewall service is on standby. The name of the user, if the session was handled by a firewall rule that requires authentication. The MAC address of the interface.

Src NAT Dst NAT Out-IF Out Route Next Hop The bind address. The IP of the connection address. The outgoing interface; tunnel and transport is visualized. Unicast or local. The next hop. A hext hop address might appear in a Local Redirect action. This routing information comes from the reverse direction lookup (how packets are routed from loopback to client). Configure the History Entries For the Firewall > History page, you can configure source and destination IP addresses to be translated to hostnames. You can also set limits for the size of cache entries and the number of entries that are displayed on the page. Hostnames First, enable reverse IP lookups on the General Firewall Configuration page. Then enable IP addresses to be translated to hostnames on the Firewall > History page. 1. 2. To enable reverse IP lookups: 1. Open the General Firewall Configuration page (Config > Box > Infrastructure Services > General Firewall Configuration). 2. In the left pane, click History Cache. 3. Enable DNS Resolve IPs. 4. Click Send Changes and then click Activate. On the Firewall > History page, select the Resolve IP Addresses check box. Cache Sizes To set limits for the size of cache entries: 1. 2. 3. 4. 5. Open the General Firewall Configuration page (Config > Box > Infrastructure Services > General Firewall Configuration). In the left pane, click History Cache. Specify the limits for each cache entry type. Click Send Changes and then click Activate. Restart the service. Maximum Cache Entries To limit the number of entries on the Firewall > History page, select a limit from the Max Entries list in the top right of the page. Then click Refresh. Filtering the List of Sessions To filter the list of sessions, click Filter in the top right of the page. The following filter settings then appear: Cache Selection From the Cache Selection list, you can select the following options: Option Access Rule Block 2 / 7 Filters For All allowed and successfully established connections. All denied connections. Packet Drop All dropped connections.

Fail ARP Scan All failed connections. All ARP requests. All SCAN tasks. Traffic Selection From the Traffic Selection list, you can select the following options: Option Filters For Forward Traffic on the Forwarding Firewall. Loopback Traffic over the loopback interface. Local In Incoming traffic on the box firewall. Local Out Outgoing traffic from the box firewall. Additional Properties You can also filter traffic by other properties such as IP addresses, interfaces, and firewall rules. Click the plus sign (+) next to the Traffic Selection list to add the following settings for improved filtering: Setting Filters For Rule A firewall rule. Proto A protocol. Source A source IP address or range. Destination A destination IP address or range. Interface An interface. For example, eth0. Addr. An IP address. Srv. A service. Port A port. Src-Interface A source interface. Dest-Interface A destination interface. You can use the asterisk (*) and question mark (?) as wildcard characters in the filter settings. Managing Sessions To manage sessions, you can right-click sessions and select the following options: Option Remove Selected Flush Cache Removes the selected access cache entries. Removes all entries from the access cache. Save Cache Selection Policy Permanently saves settings for the Cache Selection filter. Group by s Overview Groups access cache entries by the selected column. The following tables provides details on the messages that you might see in the Info column of the Firewall > History page for the following types of traffic: Denied Traffic 3 / 7

Deny by Dynamic Rule Deny by Rule Deny by Rule Destination Deny by Rule Service Deny by Rule Source Deny by Rule Time Deny Local Loop Deny No Address Translation possible The session request matched a dynamic rule that denies sessions. The session matched a rule that explicitly denies session requests. The session matched a rule with the Destination Policy set to DENY. The session watched a rule with the Service Policy set to DENY. The session matched a rule with the Source Policy set to DENY. The session matched a rule with the Time Policy set to DENY. A passing rule matched, but the destination is a local system IP address. Targeted local IP addresses must be redirected. The session matched a rule containing an address translation table that does not specify how to translate the source IP address. Blocked Traffic Block Broadcast 4 / 7 Block by Dynamic Rule Block by Rule Block by Rule Destination Block by Rule Interface Block by Rule Service Broadcasts are not propagated. The session matched a dynamic rule that blocks session. The session matched a rule that explicitly blocks session requests. The session matched a rule with the Destination Policy set to The session matched a rule with the Interface Policy set to The session matched a rule with the Service Policy set to Block by Rule Source The session matched a rule with the Source Policy set to Block by Rule Time Block Echo Session Limit Block Local Loop Block Multicast Block No Address Translation possible Block no Rule Match Block Other Session Limit Block Pending Session Limit Block Rule Limit Block Rule Source Limit Block Size Limit The session matched a rule with the Time Policy set to The number of total Echo sessions was exceeded for a request. A passing rule matched, but the destination is a local system IP address. Targeted local IP addresses must be redirected. Use the Local Redirect action for IP redirection to a local IP address. Multicasts are not propagated. The session matched a rule containing an address translation table that does not specify how to translate the source IP address. No rule matched the requested session. The default action is to block the request. The number of total other protocol sessions was exceeded for a request. The source IP address exceeded the limit for pending sessions. All pending sessions over the limit are blocked. The limit of allowed sessions for the matching rule was exceeded. The limit of allowed sessions per source IP address for the matching rule was exceeded. A packet which exceeds the specified ping size limit was received. The default limit is configured in the ICMP service object [1]. To reduce the number of sessions that are blocked for this reason, increase the Max Ping Size for the object. For ICMP Echo, the default limit is 10000 bytes.

Block Source Echo Session Limit Block Source Session Limit Block UDP Session Limit Forwarding is disabled The limit for ECHO sessions per source IP address was exceeded. The limit for sessions per source IP address was exceeded. The limit for UDP sessions was exceeded. A forwarding firewall service does not exist or is inactive. Dropped Traffic Forwarding not Active ICMP Header Checksum is ICMP Header is Incomplete ICMP Packet is Ignored ICMP Reply Without a Request ICMP Type is IP Header Checksum is IP Header Contains Source Routing IP Header has IP Options IP Header is Incomplete A packet could be assigned to the session but the forwarding firewall service is blocked. All forwarding traffic was temporarily dropped. The ICMP header checksum did not verify. The ICMP header of the packet is shorter that the minimum ICMP header length (8 bytes) or shorter than the indicated ICMP header length. An ICMP packet contains a type other than UNREACHABLE or TIME_EXCEEDED and is ignored. An ICMP Echo Reply packet was received but does not have an associated Echo session. The ICMP header contained an unknown ICMP type. The IP header checksum did not verify. The source routing IP option is set. IP Header Version is The IP version is different than 4. IP Packet is Incomplete No socket for packet Packet Belongs to no Active Session Rate Limit Reverse Routing Interface Size Limit Source is an IP Class Source is Broadcast Source is Local Address Source is Loopback The IP option encoding is malformed or contains unknown IP options. The packet is shorter than the minimum IP header length (20 bytes) or shorter than the indicated header length. The packet is smaller that the indicated total packet length. An outgoing TCP or UDP packet could not be assigned to an active socket on the system (RAW socket sending). A received ICMP packet could not be assigned to an active session. An Echo Request packet could be assigned to an existing Echo session but exceeded the request rate limit. The interval value is displayed in increments of tens (ms) The minimum offset between solitary pings (default: 10 ms) was not met. The default values are configured in the ICMP service object [2]. To reduce the number of sessions that are blocked for this reason, decrease the Min Delay for the object. The reverse routing path differs from the path the packet was received; the receiving interface differs from sending interface. IP spoofing protection. An Echo Request/Reply packet could be assigned to an existing Echo session but exceeded the configured size limit. The 240-255.x.x.x IP addresses are not allowed. The source address is a broadcast address. The source address is an IP address that is active on the local system and therefore not expected as a sender address. The source address is a loopback address (127.x.x.x). 5 / 7

Source is Multicast TCP Header Checksum is TCP Header has TCP FLAGS TCP Header has TCP Options TCP Header is Incomplete TCP Packet Belongs to no Active Session UDP Header Checksum is UDP Header is Incomplete Unknown ARP Operation Session Creation Load Possible MAC Spoofing The source address is a multicast address. The TCP header checksum did not verify. The TCP header contains useless combinations of TCP flags (SYN+RST, SYN+FIN). TCP options encoding is malformed. The TCP header of the packet is shorter that the minimum TCP header length (20 bytes) or shorter than the indicated TCP header length. A received TCP packet could not be assigned to an active TCP session and is not an initial TCP packet (SYN packet). The UDP header checksum did not verify. The UDP header of the packet is shorter that the minimum UDP header length (8 bytes) or shorter than the indicated UDP header length. The 'operation' field for an ARP packet is neither a request nor a reply. A packet, triggering a new session evaluation, was dropped because the limit for actual CPU usage when creating/evaluating the session was exceeded. The system detected a possible MAC spoofing attempt. Failed Traffic Accept Timeout Connect Timeout Denied by Filter Fragmentation Needed Host Access Denied Host Unreachable Host Unreachable for TOS Network Access Denied Network Unreachable Network Unreachable for TOS No Route to Host Port Unreachable Protocol Unreachable Routing Triangle Source Route Failed Unknown Network Error The accept timeout for TCP session establishment was exceeded (TCP only). Possible IP spoofing attempt. The connection timeout for TCP session establishment was exceeded (TCP only). The destination IP address was not reachable. A next hop was denied forwarding by a filter rule. The destination cannot be reached with the specified MTU size without fragmentation. Only occurs if Path-MTU-Discovery is used by the source or the destination. Access to the destination address was denied by one of the next hops. The destination is accessed through a direct route but does not respond to an ARP request. The requested IP address is not reachable for the specified Type of Service. Access to the destination network was denied by one of the next hops. The network for the destination of a request is not reachable; there is no routing entry on one of the next hops. The requested network is not reachable for the requested Type of Service. The local system has no routing entry for the requested destination. The destination system does not service the requested port number. The destination system does not support the requested protocol. A SYN followed by an ACK is registered without a SYN-ACK of the destination. This is an indication of a triangle route in the network. Source routing was requested but could not be performed. Will not occur, because source routed packets are dropped. Default network error. 6 / 7

Links 7 / 7