FORUM CTRLX AUTOMATION
ctrlX World Partner Apps for ctrlX AUTOMATION
Dear Community User! We have started the migration process.
This community is now in READ ONLY mode.
Read more: Important
information on the platform change.
a month ago
I have a question about the firewall.
Do I have a log somewhere where I can see which current requests have been dropped?
In one example, I have currently limited the traffic to pure Oracle DB communication.
I then sent a ping, which, as expected, did not go through (only when I had allowed everything again, -> firewall works).
Now I would also like to see and evaluate these blocked accesses.
a month ago - last edited a month ago
@MrLurtleFirekirin Apk wrote:I have a question about the firewall.
Do I have a log somewhere where I can see which current requests have been dropped?
In one example, I have currently limited the traffic to pure Oracle DB communication.
I then sent a ping, which, as expected, did not go through (only when I had allowed everything again, -> firewall works).
Now I would also like to see and evaluate these blocked accesses.
Yes, most firewalls provide logs that allow you to see which requests have been dropped. You can typically access these logs through the firewall’s management interface or via its logging settings. For example, in iptables (Linux), you can configure logging rules to capture dropped packets, while in enterprise solutions like Cisco ASA or FortiGate, there's usually a "traffic log" or "security log" that records denied traffic attempts.
2 weeks ago - last edited 2 weeks ago
@MrLurtleHere wrote:I have a question about the firewall.
Do I have a log somewhere where I can see which current requests have been dropped?
In one example, I have currently limited the traffic to pure Oracle DB communication.
I then sent a ping, which, as expected, did not go through (only when I had allowed everything again, -> firewall works).
Now I would also like to see and evaluate these blocked accesses.
To view and evaluate blocked requests in your firewall, you typically need to check the firewall's logs. Most firewalls, including those on network devices or servers, keep detailed logs of all allowed and denied traffic.