This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

DEFECT: FW rules do not reliably generate log data

Production Setup

  • XG firmware = SFVH (SFOS 17.0.0 GA)
  • Very high-level basic network diagram is included below.
  • Variety of production FW rules that allow LAN --> WAN traffic.  *** NOT RELEVANT to this issue ***
  • Two upstream WAN-side hosts ("A" and "B" in the diagram) that are sending traffic for specific services down through the XG into telemetry servers on the LAN network.
  • Two (2) production FW rules that allow traffic in the WAN --> LAN direction - one (1) rule each for hosts "A" and "B".  As specified in the diagram, the services are (i) NetFlow; (ii) Syslog; and (iii) NTP.
    • The only difference between these 2 fwRules is (a) source IP; and (b) NetFlow destination port #.
  • All FW rules in both directions have the "Log Firewall Traffic" option ENABLED.
  • Note in the diagram that the telemetry servers include both a NetFlow collector and a syslog server the latter collecting all syslog data including that sent by the XG when the "Log Firewall Traffic" fwRule option is enabled.

Test Setup

  • Production environment as specified above PLUS the following...
  • One (1) dedicated test fwRule (i.e. fwRule_underTest) cfg'd to essentially mirror the affected upstream host & service.  This test rule is placed above the other two (2) WAN --> LAN production rules so it will be matched first.  The rule is cfg'd as follows:
    • Action = ALLOW
    • Source zone = WAN
    • Destination zone = LAN
    • Source hosts\networks = HOST-B
    • Destination hosts\networks = telemetry servers (NetFlow, syslog, NTP)
    • Services = NetFlow (ANY --> UDP:17123)
    • Log Firewall Traffic = Checked
    • Everything else is left at default and\or disabled.

Issue

  • Some fwRule related traffic that is supposed to be sent when the "Log Firewall Traffic" option is enabled is NOT being generated by the XG.
  • This issue only occurs for a very specific situation - see Observations for more details.

Observations

  • All services related traffic (NetFlow, syslog, NTP) for both hosts makes it through the XG and is received at the appropriate telemetry servers (see diagram).
  • All fwRule related traffic from the unaffected host (HOST-A) is sent by the XG and received at the appropriate telemetry servers (see diagram).
  • Only when the fwRule matches for NetFlow on the affected host (HOST-B) does the XG fail to generate the fwRule related traffic despite the "Log Firewall Traffic" option being enabled.

Verifications

  • The fwRule_underTest counter steadily increases thereby indicating the rule is matching for NetFlow being sent from the affected host (HOST-B).
  • HOST-B syslog data is PRESENT in the appropriate logfiles.
  • HOST-B NetFlow data is PRESENT in the appropriate collector files.
  • HOST-B clock shows in sync and being updated by the NTP server located on the LAN side of the XG.
  • Packet captures taken at the LAN side of the XG do not have the fwRule related traffic that is supposed to be generated by the XG when NetFlow is sent from HOST-B thru the XG.
  • These same packet captures do show the HOST-B NetFlow traffic as expected.
  • These same packet captures do not contain any XG generated syslog packets that have a payload containing a "fw_rule_id" field matching the fwRuleId for the fwRule_underTest.



This thread was automatically locked due to age.
Parents
  • I meant to add this to the original post:

    • If I make one and only one change to the fwRule_underTest cfg --> Change the ACTION from ACCEPT to DROP, then the XG starts to generate the fwRule related log traffic.
    • I see evidence of this both in the proper log file and in the packet captures running on the XG LAN interface.
    • If I then switch it back from DROP to ACCEPT, the fwRule related log traffic stops again.

    So recap:

    • fwRule_underTest action = ACCEPT
      • HOST-B NetFlow traffic is matched to fwRule_underTest & allowed thru to telemetry server = PROPER OPERATION.
      • XG fails to generate the fwRule related log traffic = IMPROPER OPERATION.
    • fwRule_underTest action = DROP
      • HOST-B NetFlow traffic is matched to fwRule_underTest & dropped at XG = PROPER OPERATION.
      • XG generates the fwRule related log traffic & sends it to the telemetry server = PROPER OPERATION.
Reply
  • I meant to add this to the original post:

    • If I make one and only one change to the fwRule_underTest cfg --> Change the ACTION from ACCEPT to DROP, then the XG starts to generate the fwRule related log traffic.
    • I see evidence of this both in the proper log file and in the packet captures running on the XG LAN interface.
    • If I then switch it back from DROP to ACCEPT, the fwRule related log traffic stops again.

    So recap:

    • fwRule_underTest action = ACCEPT
      • HOST-B NetFlow traffic is matched to fwRule_underTest & allowed thru to telemetry server = PROPER OPERATION.
      • XG fails to generate the fwRule related log traffic = IMPROPER OPERATION.
    • fwRule_underTest action = DROP
      • HOST-B NetFlow traffic is matched to fwRule_underTest & dropped at XG = PROPER OPERATION.
      • XG generates the fwRule related log traffic & sends it to the telemetry server = PROPER OPERATION.
Children
No Data