Guest User!

You are not Sophos Staff.

This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Firewall Log interpretation

Hi there,

Thanx in advance for helping me understand Sophos UTM firewall/packagefilter a little more.

 

Having kind a hard time to interpret some firewall logs on my utm 9.411-3. Maybe there is something wrong, maybe i am just not getting the concept. :-)

In the logging we see srcmac, destmac, srcip and destip. I assumed that srcmac and srcip should be hard linked to eachother, same for destination.
Destmac is often the virtual mac addres of internal nic on UTM and is not correspoding to the destip.

Now we see that srcmac is used in combination with different srcip addresses. That I do not understand.

This log entry is what i would expect.
2017:04:07-11:04:05 utm ulogd[17050]: id="2002" severity="info" sys="SecureNet" sub="packetfilter" name="Packet accepted" action="accept" fwrule="9" initf="eth0" outitf="eth1" srcmac="mac_of_internal_device" dstmac="mac_of_internal_utm_nic" srcip="ip_internal_device" dstip="external_webserver_ip_A" proto="6" length="44" tos="0x00" prec="0x00" ttl="254" srcport="50017" dstport="123456" tcpflags="SYN"

 

This is what i do not understand....
2017:04:07-11:04:08 utm ulogd[17050]: id="2001" severity="info" sys="SecureNet" sub="packetfilter" name="Packet dropped" action="drop" fwrule="60002" initf="eth0" outitf="eth1" srcmac="mac_of_internal_device" dstmac="mac_of_internal_utm_nic" srcip="external_webserver_IP_B" dstip="external_webserver_ip_A" proto="6" length="40" tos="0x00" prec="0x00" ttl="254" srcport="50017" dstport="123456" tcpflags="ACK RST"

 

So what we've got here is a request from the same source mac using different source ip addresses. Is this like expected behaviour and do I just not understand the concept or is this at least a little strange....

 

 

 

 



This thread was automatically locked due to age.
  • That's OK. Thats how IP-routing works.

    within LAN (same subnet) you see the MAC for every device.

    With routing you see the MAC of the router for all IP's behind this device.

    This can be explained with OSI 7 layer model...

    https://support.microsoft.com/de-de/help/103884/the-osi-model-s-seven-layers-defined-and-functions-explained

    The MAC address within packet are from L2. The L2 don#t know something from L3(IP). Here we see only communication between direct linked devices. (Router<->Firewall or Firewall<->endsystem)


    Dirk

    Systema Gesellschaft für angewandte Datentechnik mbH  // Sophos Platinum Partner
    Sophos Solution Partner since 2003
    If a post solves your question, click the 'Verify Answer' link at this post.

  • Hi, Sebastiaan, and welcome to the UTM Community!

    As Dirk says, the MAC addresses represent the next physical hop to reach an IP - your ISP's router and your internal switch.

    Cheers - Bob

     
    Sophos UTM Community Moderator
    Sophos Certified Architect - UTM
    Sophos Certified Engineer - XG
    Gold Solution Partner since 2005
    MediaSoft, Inc. USA