This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

V18 not logging blocked HTTP/HTTPS connections

Hi,

we've got a brand new virtual XG 18 running in Azure. We've set up a firewall rule to restrict our internal servers to which internet servers they can communicate with via HTTP/HTTPS:

The firewall rule itself works fine, but when I check the logs, nothing is being shown as dropped or denied. I need to be able to see which URL's the servers are trying to talk to for troubleshooting. We had a pretty featureless Azure Firewall before which would log it perfectly like this when a server tried to access an URL which wasn't in the firewall rule:

{"msg":"HTTP  request from 10.4.0.5:54785 to nu.nl:80. Action: Deny. No rule matched. Proceeding with default action"}

So how do I get the XG firewall to show me this?



This thread was automatically locked due to age.
Parents Reply Children
No Data