Related to this SQL Injection attack that was found last week. I searched my Graylog server and only see incoming connections from the Additional Attack Host going to NAT servers and not my User Portal. I have the IPs they accessed NATed (80/443) to other web servers so I don't think the User Portal would have been accessible on those IP.
I don't see any outgoing traffic from the scripts being downloaded, so I think this is a false positive for me.
To test this, I SSH to the firewall and ping stuff, run 'nc hostname <port>' to create some test connections from the shell. None of these activities are shown in logs. I created a new MASQ rule that is sourced from ANY zone, Any source, to the WAN and still don't see this activity logged. This is concerning to me, if another attack like this happened how do we have a "trail" so we can see what happened? Logging in this OS is horrible, I can't understand how it could be for a firewall appliance.
TL;DR: How do we log system generated traffic?
This thread was automatically locked due to age.