You can learn session creation situations of the firewalls based on IPv6 packets by checking IPv4 session logs on the LogCenter.
The LogCenter supports the following modes of querying IPv6 session logs:
l IPv6 DS-Lite
You can query session logs generated by the IPv6 DS-Lite function.
l IPv6 NAT-PT
You can query session logs generated by the IPv6 NAT-PT function.
l IPv6 NAT64
You can query session logs generated by the IPv6 NAT64 function.
This section describes adaptation of the firewalls in different product forms to different log query modes.
USG6000 V100R001C10/V100R001C20/V100R001C30
Table 4-14 describes adaptation of firewalls of USG6000 V100R001C10/V100R001C20/V100R001C30.
Table 1-1 Adaptation of firewalls of USG6000 V100R001C10/V100R001C20/V100R001C30 to IPv6 session logs
| Query Mode |
Log Type |
Log Format |
Output Mode |
Key Configuration Points |
Description |
| IPv6 DS-Lite |
- |
- |
- |
- |
The firewalls of these versions do not generate this type of logs. Therefore, you cannot view the corresponding logs on the LogCenter. |
| IPv6 NAT-PT |
- |
- |
- |
- |
The firewalls of these versions do not generate this type of logs. Therefore, you cannot view the corresponding logs on the LogCenter. |
| IPv6 NAT64 |
- |
- |
- |
- |
The firewalls of these versions do not generate this type of logs. Therefore, you cannot view the corresponding logs on the LogCenter. |
USG9500 V300R001C01
The IPv6 session logs of the firewalls of USG9500 V300R001C01 include session aging logs, session creation logs, and scheduled session logs. Table 4-15 describes the adaptation of the firewalls.
<?xml:namespace prefix = "v" ns = "urn:schemas-microsoft-com:vml" />
If the firewall outputs session aging logs, session creation logs, and scheduled session logs at the same time, the logs received by the LogCenter increase sharply and greatly consume the storage space of the LogCenter. Therefore, be careful in the actual deployment.
Unless otherwise specified, the operator involved in configurations indicates the system administrators of the firewalls.
Table 1-2 Adaptation of firewalls of USG9500 V300R001C01 to IPv6 session logs
| Query Mode |
Log Type |
Log Format |
Output Mode |
Key Configuration Points |
Description |
| IPv6 DS-Lite |
Session aging logs |
Binary |
The logs are directly sent to the LogCenter. |
l In the system view, run the firewall log host command to configure the log host and set the port number to 9002. l In the system view, run the firewall log source command to configure the source address and source port used for sending the session logs. l In the system view, configure IPv4 auditing policies. l If the firewall serves as the CGN, configure the DS-Lite function. |
Because the session logs generated by the DS-Lite function are IPv4 session logs, you need to configure the corresponding IPv4 audit policies. For details about configuration instances, see 7.2.2 Checking IPv6 Session Logs on the LogCenter. |
| Session creation logs |
Binary |
The logs are directly sent to the LogCenter. |
l In the system view, run the firewall log host command to configure the log host and set the port number to 9002. l In the system view, run the firewall log source command to configure the source address and source port used for sending the session logs. l In the system view, configure IPv4 auditing policies. l If the firewall serves as the CGN, configure the DS-Lite function. l In the system view, run the firewall log session new-session enable command to enable the function of generating session creation logs. |
Because the session logs generated by the DS-Lite function are IPv4 session logs, you need to configure the corresponding IPv4 audit policies. For details about configuration instances, see 7.2.2 Checking IPv6 Session Logs on the LogCenter. | |
| Scheduled session logs |
Binary |
The logs are directly sent to the LogCenter. |
l In the system view, run the firewall log host command to configure the log host and set the port number to 9002. l In the system view, run the firewall log source command to configure the source address and source port used for sending the session logs. l In the system view, configure IPv4 auditing policies. l If the firewall serves as the CGN, configure the DS-Lite function. l In the system view, run the firewall log session periodic enable command to enable the function of generating session creation logs. Run the firewall log session periodic time-interval command to configure the interval for sending logs. |
Because the session logs generated by the DS-Lite function are IPv4 session logs, you need to configure the corresponding IPv4 audit policies. In addition, the session logs generated by the DS-Lite function can also be periodically output. For details about configuration instances, see 7.2.2 Checking IPv6 Session Logs on the LogCenter. | |
| IPv6 NAT-PT |
- |
- |
- |
- |
The firewalls of these versions do not generate this type of logs. Therefore, you cannot view the corresponding logs on the LogCenter. |
| IPv6 NAT64 |
Session aging logs |
Binary |
The logs are directly sent to the LogCenter. |
l In the system view, run the firewall log host command to configure the log host and set the port number to 9002. l In the system view, run the firewall log source command to configure the source address and source port used for sending the session logs. l In the system view, configure IPv6 auditing policies. l Configure the NAT64 function. |
Because the session logs generated by the NAT64 function are IPv6 session logs, you need to configure the corresponding IPv6 audit policies. |
| Session creation logs |
Binary |
The logs are directly sent to the LogCenter. |
l In the system view, run the firewall log host command to configure the log host and set the port number to 9002. l In the system view, run the firewall log source command to configure the source address and source port used for sending the session logs. l In the system view, configure IPv6 auditing policies. l Configure the NAT64 function. l In the system view, run the firewall log session new-session enable command to enable the function of generating session creation logs. |
Because the session logs generated by the NAT64 function are IPv6 session logs, you need to configure the corresponding IPv6 audit policies. |
In addition, IPv6 DS-Lite and IPv6 NAT64 session logs can also be output to the LogCenter in netflow format. You can view log information in Log Analysis > Session Analysis > Netflow Session Query > Netflow DS-Lite or Log Analysis > Session Analysis > Netflow Session Query > Netflow NAT64 on the LogCenter.