Skip to main content
Cisco Meraki Documentation

Firewall Logging

Click 日本語 for Japanese


Firewall Log is a live tool that allows you to view the verdict of real-time traffic flows after being processed by the Layer 3 and Layer 7 firewalls. This tool can be used to help surface issues during troubleshooting and can help verify that configured rules are working as expected. This feature is available on MX firmware release 18.2 and newer.

Quick Start Guide

To use Firewall Logging:

  1. Navigate to Security & SD-WAN > Monitor > Appliance status

  2. Click on the “Tools” tab. 

  3. Find “Firewall Log” 
    Firewall Log.png

  4. Enter any filters required and then click the “Start” button.



The flow has been allowed

The flow has been denied


For the best results with the Firewall Log tool, it is important to filter for a specific traffic flow you are targeting. The following filters can be configured:


Accepted Parameters


  • Client Name (as shown in Network-wide > Monitor > Clients Dashboard page) 

  • MAC address


  • Applies to Source or Destination IP:

    • IPv4

    • IPv6


  • Port number (e.g., 80) 


  • Allowed

  • Blocked

  • Both

Logging Expectations

Flows are uniquely defined by five elements; Source IP, Destination IP, Source Port, Destination Port, and Protocol. Each flow is expected to be logged once for each policy it passes through (in most cases this is Layer 7 and Layer 3 FW rule policies). As an example, if you are sending continuous pings to, you should only see the flow logged once for the L3 policy and once for the L7 policy. The same applies to TCP and UDP flows. Below is an example of traffic destined for, while it is blocked in Layer 3 rules, but allowed in Layer 7:

Firewall Logging example.png

Note: To filter by ICMP, leave the Ports section of the Firewall Log empty, it does not accept "any" or "0" as a parameter.





Firewall decision (allowed or denied) based on configured Layer 3 and Layer 7 policy


Time of the event using the network configured time in the following format: Month Day HH:MM:SS

Source IP

IP address of the sender

Source Port

Port used by the sender

Destination IP

IP address of the receiver


IP protocol used


Identifier of the client as shown in Dashboard (Network-wide > Monitor > Clients)


Policy (by Firewall) Description
Cellular Outbound firewall for the Cellular interface.
L3 (Client VPN) Layer 3 Outbound Firewall specific to Client VPN traffic
L3 (LAN) Layer 3  Outbound Firewall. This applies to traffic that is routed on the LAN or from LAN to WAN.
L3 (VPN) Layer 3  Outbound Firewall specific to AutoVPN & IPSEC VPN (Non-Meraki VPN)
L7 Layer 7  Outbound Firewall
Stateful (cell) Inbound firewall for the Cellular interface.
Stateful (v4) IPv4 inbound firewall for the Internet interfaces. This is automatically configured in NAT mode when services like port-forwarding, 1:1 NAT, etc are enabled.
Stateful (v6) IPv6 inbound firewall for the Internet interfaces.
  • Was this article helpful?