Skip to main content

 

Cisco Meraki Documentation

Firewall Logging

The Firewall Log is a monitoring tool that displays the outcomes of traffic after it has been evaluated by Layer 3 and Layer 7 firewalls. It is useful for identifying problems during troubleshooting and confirming that the rules are functioning correctly.

Click 日本語 for Japanese

Introduction

Firewall Log is a live tool that allows you to view the verdict of real-time traffic flows after being processed by the Layer 3 and Layer 7 firewalls. This tool can be used to help surface issues during troubleshooting and can help verify that configured rules are working as expected. This feature is available on MX firmware release 18.2 and newer.

For a quick reference of all MX appliances capable of running the current firmware version and which ones are not, please refer to the following documentation: Product Firmware Version Restrictions

 

Quick Start Guide

To use Firewall Logging:

  1. Navigate to Security & SD-WAN > Monitor > Appliance status

  2. Click on the “Tools” tab. 

  3. Find “Firewall Log” 
    Firewall Log.png

  4. Enter any filters required and then click the “Start” button.

Verdict

Definition

The flow has been allowed

The flow has been denied

Filtering

For the best results with the Firewall Log tool, it is important to filter for a specific traffic flow you are targeting. The following filters can be configured:

Filter

Accepted Parameters

Client

  • Client Name (as shown in Network-wide > Monitor > Clients Dashboard page) 

  • MAC address

IP

  • Applies to Source or Destination IP:

    • IPv4

    • IPv6

Port

  • Port number (e.g., 80) 

Verdict

  • Allowed

  • Blocked

  • Both

Logging Expectations

Flows are uniquely defined by five elements; Source IP, Destination IP, Source Port, Destination Port, and Protocol. Each flow is expected to be logged once for each policy it passes through (in most cases this is Layer 7 and Layer 3 FW rule policies). As an example, if you are sending continuous pings to 8.8.8.8, you should only see the flow logged once for the L3 policy and once for the L7 policy. The same applies to TCP and UDP flows. Below is an example of traffic destined for 6.6.6.6, while it is blocked in Layer 3 rules, but allowed in Layer 7:

Firewall Logging example.png

Note: To filter by ICMP, leave the Ports section of the Firewall Log empty, it does not accept "any" or "0" as a parameter.

Note: The Rule # will begin at 0 for the first configured firewall rule, then increment by 1 for each further rule. Therefore, if a flow hits the first configured firewall rule it will show the Rule # as 0 rather than 1.

Definitions

Column

Definition

Verdict

Firewall decision (allowed or denied) based on configured Layer 3 and Layer 7 policy

Timestamp

Time of the event using the network configured time in the following format: Month Day HH:MM:SS

Source IP

IP address of the sender

Source Port

Port used by the sender

Destination IP

IP address of the receiver

Protocol

IP protocol used

Client

Identifier of the client as shown in Dashboard (Network-wide > Monitor > Clients)

 

Policy (by Firewall) Description
Cellular Outbound firewall for the Cellular interface.
L3 (Client VPN) Layer 3 Outbound Firewall specific to Client VPN traffic
L3 (LAN) Layer 3  Outbound Firewall. This applies to traffic that is routed on the LAN or from LAN to WAN.
L3 (VPN) Layer 3  Outbound Firewall specific to AutoVPN & IPSEC VPN (Non-Meraki VPN)
L7 Layer 7  Outbound Firewall
Stateful (cell) Inbound firewall for the Cellular interface.
Stateful (v4) IPv4 inbound firewall for the Internet interfaces. This is automatically configured in NAT mode when services like port-forwarding, 1:1 NAT, etc are enabled.
Stateful (v6) IPv6 inbound firewall for the Internet interfaces.
  • Was this article helpful?