Denied Connections Reports
To search for and generate a report on denied connections by selected firewall log sources during a specified time interval, use the Denied Connections Real-Time Report.
Menu path:
In addition to setting the common report options in Preparing a Real-time Report, you can select:
- The type of information the appliance aggregates for the generated report
- Various optional filter operators in the generated report for your appliance
Method | Description |
---|---|
Src IP/Any--> Any/Port | Aggregates records from a specific Source IP and any port going to any destination IP and a specific destination port. The system derives the Source IP and destination port from your Device Type and Source Device selections. |
Src IP/Any --> Dest IP/Port | Aggregates records from a specific Source IP and any port going to a specific Destination IP and specific Destination port. The system derives the Source IP and Destination IP from your Device Type and Source Device selections. |
Denied by Port | Aggregates records from the port numbers only |
Optional filter operators can be sorted in ascending or descending order. Choose sort order using the drop-down menu. The default is to display all the following optional filter operators.
For more information on saving the generated report, see Formats for Saving a Generated Report.
Option | Description |
---|---|
Source Device | Description of the device that sent these log messages |
Attempts* | Number of times log messages denied the connection |
Src IP | IP address of the source host device |
Src Port | Port number of the source host device |
Dest IP | IP address of the destination host device |
Dest Port | Port number of the destination host device |
Protocol | IP protocol (TCP, UDP, so on.) of the connection |
Description | Description of the destination port (service) |
Access Group | (Cisco PIX/ASA only) Lists any group of which you are a member |
Rules | (Check Point Interface only) Condition set on the firewall to complete the security policy; identifies what is allowed and not allowed through a specific interface. |
Policy ID | Unique policy identifier of the device on the firewall (Juniper Firewall only) |
Direction | (Check Point Interface, Cisco PIX/ASA/FWSM, Juniper Firewall, and Nortel Connectivity only) Inbound or Outbound connection attempt. Direction is stored as a number internally, for INBOUND use 1, for OUTBOUND use 2, and for INTERNAL use 3. |
Related reference
Copyright © Cloud Software Group, Inc. All rights reserved.