Dear Community User! We have started the migration process.
This community is now in READ ONLY mode.
Read more: Important information on the platform change.

cancel
Showing results for 
Search instead for 
Did you mean: 

Firewall - logging of blocked requests

Firewall - logging of blocked requests

MrLurtle
Established Member

I have a question about the firewall.
Do I have a log somewhere where I can see which current requests have been dropped?

In one example, I have currently limited the traffic to pure Oracle DB communication.
I then sent a ping, which, as expected, did not go through (only when I had allowed everything again, -> firewall works).
Now I would also like to see and evaluate these blocked accesses.

2 REPLIES 2

smith
New Poster

@MrLurtleFirekirin Apk wrote:

I have a question about the firewall.
Do I have a log somewhere where I can see which current requests have been dropped?

In one example, I have currently limited the traffic to pure Oracle DB communication.
I then sent a ping, which, as expected, did not go through (only when I had allowed everything again, -> firewall works).
Now I would also like to see and evaluate these blocked accesses.


Yes, most firewalls provide logs that allow you to see which requests have been dropped. You can typically access these logs through the firewall’s management interface or via its logging settings. For example, in iptables (Linux), you can configure logging rules to capture dropped packets, while in enterprise solutions like Cisco ASA or FortiGate, there's usually a "traffic log" or "security log" that records denied traffic attempts.

smith
New Poster

@MrLurtleHere wrote:

I have a question about the firewall.
Do I have a log somewhere where I can see which current requests have been dropped?

In one example, I have currently limited the traffic to pure Oracle DB communication.
I then sent a ping, which, as expected, did not go through (only when I had allowed everything again, -> firewall works).
Now I would also like to see and evaluate these blocked accesses.


To view and evaluate blocked requests in your firewall, you typically need to check the firewall's logs. Most firewalls, including those on network devices or servers, keep detailed logs of all allowed and denied traffic.

Icon--AD-black-48x48Icon--address-consumer-data-black-48x48Icon--appointment-black-48x48Icon--back-left-black-48x48Icon--calendar-black-48x48Icon--center-alignedIcon--Checkbox-checkIcon--clock-black-48x48Icon--close-black-48x48Icon--compare-black-48x48Icon--confirmation-black-48x48Icon--dealer-details-black-48x48Icon--delete-black-48x48Icon--delivery-black-48x48Icon--down-black-48x48Icon--download-black-48x48Ic-OverlayAlertIcon--externallink-black-48x48Icon-Filledforward-right_adjustedIcon--grid-view-black-48x48IC_gd_Check-Circle170821_Icons_Community170823_Bosch_Icons170823_Bosch_Icons170821_Icons_CommunityIC-logout170821_Icons_Community170825_Bosch_Icons170821_Icons_CommunityIC-shopping-cart2170821_Icons_CommunityIC-upIC_UserIcon--imageIcon--info-i-black-48x48Icon--left-alignedIcon--Less-minimize-black-48x48Icon-FilledIcon--List-Check-grennIcon--List-Check-blackIcon--List-Cross-blackIcon--list-view-mobile-black-48x48Icon--list-view-black-48x48Icon--More-Maximize-black-48x48Icon--my-product-black-48x48Icon--newsletter-black-48x48Icon--payment-black-48x48Icon--print-black-48x48Icon--promotion-black-48x48Icon--registration-black-48x48Icon--Reset-black-48x48Icon--right-alignedshare-circle1Icon--share-black-48x48Icon--shopping-bag-black-48x48Icon-shopping-cartIcon--start-play-black-48x48Icon--store-locator-black-48x48Ic-OverlayAlertIcon--summary-black-48x48tumblrIcon-FilledvineIc-OverlayAlertwhishlist