Link to home
Start Free TrialLog in
Avatar of localgareth
localgareth

asked on

Log messages on Watchguard Firebox II

Hi

Can anyone tell me what the '60 tcp 20 63' means from the extract of my Firebox logs?

04/28/04 13:15  firewalld[118]:  deny out eth1 60 tcp 20 63 10.255.255.48 193.195.0.110 48058 8080 syn (Outgoing) message


Gareth
ASKER CERTIFIED SOLUTION
Avatar of Tim Holman
Tim Holman
Flag of United Kingdom of Great Britain and Northern Ireland image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
Avatar of localgareth
localgareth

ASKER

Hi

Thanks for the reply

04/28/04 16:45  firewalld[118]:  allow out eth1 60 tcp 20 63 10.255.255.48 193.195.0.110 52880 8080 syn (SquidParentProxy)
04/28/04 16:45  firewalld[118]:  allow out eth1 60 tcp 20 64 10.255.255.48 193.195.0.110 52881 8080 syn (SquidParentProxy)
04/28/04 16:57  firewalld[118]:  deny in eth0 48 tcp 20 126 192.168.19.131 10.255.255.30 1273 8080 syn (default)
04/28/04 16:57  firewalld[118]:  deny in eth0 48 tcp 20 126 192.168.19.131 10.255.255.30 1273 8080 syn (default)
04/28/04 16:57  firewalld[118]:  deny in eth0 48 tcp 20 126 192.168.19.131 10.255.255.30 1273 8080 syn (default)
04/28/04 17:02  firewalld[118]:  deny out eth1 76 udp 20 63 10.255.255.48 158.152.1.76 123 123 (Outgoing)

Is this enough data? I'm looking at the logs in the 'Traffic Monitor' of the System Manager - it doesn't give headings.


Gareth
I've just checked the Watchguard manual -

http://www.watchguard.com/help/docs/v70UserGuide.pdf

The packet event fields are described here in order, from
left to right.

Disposition
The disposition can be as follows:
- Allow – Packet was permitted by the current set
of filter rules.
- Deny – Packet was dropped by the current set of
filter rules.

Direction
Determines whether the packet was logged when it
was received by the interface (“in”) or when it was
about to be transmitted by the Firebox (“out”).

Interface
The name of the network interface associated with
the packet.

Total packet length
The total length of the packet in octets.

Protocol
Protocol name, or a number from 0 to 255.

IP header length
Length, in octets, of the IP header for this packet. A
header length that is not equal to 20 indicates that
IP options were present.

TTL (time to live)
The value of the TTL field in the logged packet.

Source address
The source IP address of the logged packet.

Destination address
The destination IP address of the logged packet.

Source port
The source port of the logged packet, UDP or TCP
only.

Destination port
The destination port of the logged packet, UDP or
TCP only.

Details
Additional information appears after the
previously described fields, including data about
IP fragmentation, TCP flag bits, IP options, and
source file and line number when in trace mode. If
WatchGuard logging is in debug or verbose mode,
additional information is reported. In addition, the
type of connection may be displayed in
parentheses.

So my first guess was correct !
Tim - Thanks :-)


Gareth