[j-nsp] Traffic Logging

a. rahman isnaini rst / netsoft risnaini at netsoft.net.id
Tue Dec 2 18:19:54 EST 2008


Hi Danny,

I'm logging a small traffic for test purpose before redirecting the real 
one to syslog server.
Here the output of showing firewall log detail with filter name 
logging-traffic.
As you can see there are no others traffic logged, but point to point IP 
which BGP session only. (192.168.3.16/30) between two routers.
While suppose to be another traffic passign through...

Time of Log: 2008-12-03 05:50:44 JAVT, Filter: logging-traffic, Filter 
action: accept, Name of interface: local
Name of protocol: TCP, Packet Length: 0, Source address: 
192.168.3.17:179, Destination address: 192.168.3.18:2693
Time of Log: 2008-12-03 05:50:44 JAVT, Filter: pfe, Filter action: 
accept, Name of interface: ge-1/3/0.115
Name of protocol: TCP, Packet Length: 52, Source address: 
192.168.3.18:2693, Destination address: 192.168.3.17:179
Time of Log: 2008-12-03 05:50:21 JAVT, Filter: logging-traffic, Filter 
action: accept, Name of interface: local
Name of protocol: TCP, Packet Length: 51266, Source address: 
192.168.3.17:179, Destination address: 192.168.3.18:2693
Time of Log: 2008-12-03 05:50:21 JAVT, Filter: pfe, Filter action: 
accept, Name of interface: ge-1/3/0.115
Name of protocol: TCP, Packet Length: 71, Source address: 
192.168.3.18:2693, Destination address: 192.168.3.17:179
Time of Log: 2008-12-03 05:50:14 JAVT, Filter: pfe, Filter action: 
accept, Name of interface: ge-1/3/0.115
Name of protocol: TCP, Packet Length: 52, Source address: 
192.168.3.18:2693, Destination address: 192.168.3.17:179
Time of Log: 2008-12-03 05:50:13 JAVT, Filter: logging-traffic, Filter 
action: accept, Name of interface: local
Name of protocol: TCP, Packet Length: 50661, Source address: 
192.168.3.17:179, Destination address: 192.168.3.18:2693
Time of Log: 2008-12-03 05:49:56 JAVT, Filter: logging-traffic, Filter 
action: accept, Name of interface: local
Name of protocol: TCP, Packet Length: 51266, Source address: 
192.168.3.17:179, Destination address: 192.168.3.18:2693
Time of Log: 2008-12-03 05:49:56 JAVT, Filter: pfe, Filter action: 
accept, Name of interface: ge-1/3/0.115
Name of protocol: TCP, Packet Length: 71, Source address: 
192.168.3.18:2693, Destination address: 192.168.3.17:179
Time of Log: 2008-12-03 05:49:44 JAVT, Filter: pfe, Filter action: 
accept, Name of interface: ge-1/3/0.115
Name of protocol: TCP, Packet Length: 52, Source address: 
192.168.3.18:2693, Destination address: 192.168.3.17:179
Time of Log: 2008-12-03 05:49:43 JAVT, Filter: logging-traffic, Filter 
action: accept, Name of interface: local
Name of protocol: TCP, Packet Length: 0, Source address: 
192.168.3.17:179, Destination address: 192.168.3.18:2693
Time of Log: 2008-12-03 05:49:29 JAVT, Filter: logging-traffic, Filter 
action: accept, Name of interface: local
Name of protocol: TCP, Packet Length: 51266, Source address: 
192.168.3.17:179, Destination address: 192.168.3.18:2693
Time of Log: 2008-12-03 05:49:29 JAVT, Filter: pfe, Filter action: 
accept, Name of interface: ge-1/3/0.115

Expecting :

29w1d: %SEC-6-IPACCESSLOGP: list 101 permitted tcp 10.10.100.32.81(25) 
-> 172.16.5.250(30705), 1 packet
29w1d: %SEC-6-IPACCESSLOGP: list 101 permitted tcp 10.10.100.32.57(3306) 
-> 172.16.5.250(30716), 1 packet
29w1d: %SEC-6-IPACCESSLOGP: list 101 permitted tcp 10.10.100.32.57(3306) 
-> 172.16.5.250(30719), 1 packet
29w1d: %SEC-6-IPACCESSLOGP: list 101 permitted tcp 10.10.100.32.57(3306) 
-> 172.16.5.250(30721), 1 packet
29w1d: %SEC-6-IPACCESSLOGP: list 101 permitted tcp 10.10.100.3.220(3306) 
-> 172.16.5.250(30722), 1 packet
29w1d: %SEC-6-IPACCESSLOGP: list 101 permitted tcp 10.10.100.32.57(3306) 
-> 172.16.5.250(30723), 1 packet

a. r. isnaini rangkayo sutan


Danny Vernals wrote:
> The "then log" option only logs to the PFE buffer which is rather
> limited in size and also is only exposed in the "sh firewall log"
> command you mention, it's not sent to the syslog daemon.  However if
> you expect to be logging at a high pps it has the benefit of not
> adding excess load to the RE. To see more detailed output you can use
> "show firewall log detail".
> 
> If you would like to send the logging to messages or any other file
> you specifiy in the syslog config you need to use "then syslog"
> instead.
> 
> I'm not sure what you mean by "it match the log but only shows Point
> to Point session"
> 
> 
> 
> On Mon, Dec 1, 2008 at 10:46 PM, a. rahman isnaini rst / netsoft
> <risnaini at netsoft.net.id> wrote:
>> Hi,
>>
>>
>> To generate log like cisco "sh logging" using access-list, i have configured
>> :
>> - Firewall>Family Inet>Filter "log">Match all then log
>> - Interface>Unit x> Family Inet> input filter "log"
>> - System>Services>Syslog>all facilities [any]
>>
>> All I've seen by "show log messages" is just simply standard log (somebody
>> is login, etc..).
>> And as well, "show firewall log", it match the "log" but only shows Point to
>> Point session.
>>
>> Any simple way to have log such cisco did ? please kindly advice.
>>
>> rgs
>> a. r.isnaini rangkayo sutan
>> _______________________________________________
>> juniper-nsp mailing list juniper-nsp at puck.nether.net
>> https://puck.nether.net/mailman/listinfo/juniper-nsp
>>
> 
> 
> 


More information about the juniper-nsp mailing list