Got it

FAQ-LogCenter IPv4 Session Query

Latest reply: Nov 19, 2016 13:42:43 1469 1 0 0 0

Hello everyone,

Today I will share with you how to query the IPv4 sessions on LogCenter.
You can learn session creation situations of the firewalls based on IPv4 packets by checking IPv4 session logs on the LogCenter.
The LogCenter supports the following modes of querying IPv4 session logs:
IPv4 PAT
You can query logs of sessions that experience the IP address conversion or port conversion and logs of sessions that do not experience the IP address conversion and port conversion.
IPv4 No-PAT
You can query logs of sessions that experience only the IP address conversion instead of port conversion.
This section describes an adaptation of the firewalls in different product forms to different log query modes.
USG6000 V100R001C10/V100R001C20/V100R001C30
Table 4-12 describes an adaptation of firewalls of USG6000 V100R001C10/V100R001C20/V100R001C30.
<?xml:namespace prefix = "v" ns = "urn:schemas-microsoft-com:vml" />
The firewalls are required to output session logs in dataflow format, so that you can view the corresponding logs in Log Analysis > Session Analysis > IPv4 Session Query on the LogCenter.
Unless otherwise specified, the operator involved in configurations indicates the system administrators of the firewalls.

Table 1-1 Adaptation of firewalls of USG6000 V100R001C10/V100R001C20/V100R001C30 to IPv4 session logs

Query Mode

Log Type

Log Format

Output Mode

Key Configuration Points

Description

IPv4 PAT

Session logs

Dataflow

The logs are directly sent to the LogCenter.

lIn the system view, run the data-flow loghost command to configure the log host and set the port number to 9903.

lIn the security policy rule view, run the session logging command to enable the function of recording session logs.

lIn the system view, configure the NAT address pool, set the mode of the NAT address pool to nat-mode pat, configure NAT policies, and set the firewall to reference the NAT address pool.

If no NAT policy is configured, you can view only logs of sessions that do not experience the IP address conversion on the LogCenter.

For details about configuration instances, see 7.2.1 Checking IPv4 Session Logs on the LogCenter.

IPv4 No-PAT

Session logs

Dataflow

The logs are directly sent to the LogCenter.

lIn the system view, run the data-flow loghost command to configure the log host and set the port number to 9903.

lIn the security policy rule view, run the session logging command to enable the function of recording session logs.

lIn the system view, configure the NAT address pool, set the mode of the NAT address pool to nat-mode no-pat, configure NAT policies, and set the firewall to reference the NAT address pool.

For details about configuration instances, see 7.2.1 Checking IPv4 Session Logs on the LogCenter.


 In addition, the firewalls can output IPv4 PAT and IPv4 No-PAT logs to the LogCenter in Syslog format. You can view the corresponding logs in Log Analysis > Network Security Analysis > Event Monitor and Log Analysis > Network Security Analysis > Event Query on the LogCenter. In actual deployment, do not set the firewalls to output session logs in Syslog format to avoid excessive storage space occupation or performance deterioration on the LogCenter.

USG9500 V300R001C01

The IPv4 session logs of the firewalls of USG9500 V300R001C01 include session aging logs, session creation logs, scheduled session logs, and NAT No-PAT session creation logs. Table 4-13 describes the adaptation of the firewalls.

The firewalls are required to output session logs in binary format so that you can view the corresponding logs in Log Analysis > Session Analysis > IPv4 Session Query on the LogCenter.

If the firewall outputs session aging logs, session creation logs, and scheduled session logs at the same time, the logs received by the LogCenter increase sharply and greatly consume the storage space of the LogCenter. Therefore, be careful in the actual deployment.

Unless otherwise specified, the operator involved in configurations indicates the system administrators of the firewalls.

Table 1-2 Adaptation of firewalls of USG9500 V300R001C01 to IPv4 session logs

Query Mode

Log Type

Log Format

Output Mode

Key Configuration Points

Description

IPv4 PAT

Session aging logs

Binary

The logs are directly sent to the LogCenter.

lIn the system view, run the firewall log host command to configure the log host and set the port number to 9002.

lIn the system view, run the firewall log source command to configure the source address and source port used for sending the session logs.

lIn the system view, configure IPv4 auditing policies.

lIn the system view, configure the NAT address pool, set the mode of the NAT address pool to PAT, configure NAT policies, and set the firewall to reference the NAT address pool.

If no NAT policy is configured, you can view only logs of sessions that do not experience the IP address conversion on the LogCenter.

For details about configuration instances, see 7.2.1 Checking IPv4 Session Logs on the LogCenter.

Session creation logs

Binary

The logs are directly sent to the LogCenter.

lIn the system view, run the firewall log host command to configure the log host and set the port number to 9002.

lIn the system view, run the firewall log source command to configure the source address and source port used for sending the session logs.

lIn the system view, configure IPv4 auditing policies.

lIn the system view, configure the NAT address pool, set the mode of the NAT address pool to PAT, configure NAT policies, and set the firewall to reference the NAT address pool.

lIn the system view, run the firewall log session new-session enable command to enable the function of generating session creation logs.

If no NAT policy is configured, you can view only logs of sessions that do not experience the IP address conversion on the LogCenter.

For details about configuration instances, see 7.2.1 Checking IPv4 Session Logs on the LogCenter.

Scheduled session logs

Binary

The logs are directly sent to the LogCenter.

lIn the system view, run the firewall log host command to configure the log host and set the port number to 9002.

lIn the system view, run the firewall log source command to configure the source address and source port used for sending the session logs.

lIn the system view, configure IPv4 auditing policies.

lIn the system view, configure the NAT address pool, set the mode of the NAT address pool to PAT, configure NAT policies, and set the firewall to reference the NAT address pool.

lIn the system view, run the firewall log session periodic enable command to enable the function of generating session creation logs. Run the firewall log session periodic time-interval command to configure the interval for sending logs.

If no NAT policy is configured, you can view only logs of sessions that do not experience the IP address conversion on the LogCenter.

For details about configuration instances, see 7.2.1 Checking IPv4 Session Logs on the LogCenter.

IPv4 No-PAT

Logs generated when the dynamic server-map of the NAT No-PAT sessions is created

Logs generated when the dynamic server-map of the NAT No-PAT sessions is aged

Binary

The logs are directly sent to the LogCenter.

lIn the system view, run the firewall log host command to configure the log host and set the port number to 9002.

lIn the system view, run the firewall log source command to configure the source address and source port used for sending the session logs.

lIn the system view, configure IPv4 auditing policies.

lIn the system view, configure the NAT address pool, set the mode of the NAT address pool to No-PAT, configure NAT policies, and set the firewall to reference the NAT address pool.

lIn the system view, run the firewall log nat-nopat enable command to enable the function of sending No-PAT session logs.

For details about configuration instances, see 7.2.1 Checking IPv4 Session Logs on the LogCenter.


In addition, the firewalls can output the IPv4 PAT session logs, including the session aging logs, session creation logs, and scheduled session logs, to the LogCenter in netflow or syslog format. When the firewalls output the logs in netflow format, you can view the logs in Log Analysis > Session Analysis > Netflow Session Query > Netflow IPv4 on the LogCenter; when the firewalls output the logs in syslog format, you can view the logs in Log Analysis > Network Security Analysis > Event Monitor or Log Analysis > Network Security Analysis > Event Query on the LogCenter. In actual deployment, do not set the firewalls to output session logs in syslog format to avoid excessive storage space occupation or performance deterioration on the LogCenter.


That is all I want to share with you! Thank you!

  • x
  • convention:

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.