Hello all, We're using Fortigate 600C and just upgraded FortiOS to v5.6.6 from v5.4. While using v5.4, action=accept in our traffic logs was only referring to non-TCP connections and we were looking for action=close for successfully ended TCP connections. After we upgraded, the action field in our traffic logs started to take action=accept values for TCP connections as well and we're now having difficulties in differentiating the successfully ended TCP connections. We've looked at the forums, found this and also went through FortiOS - Log Reference document for v5.6.6 but got no success in understanding the real difference. FortiOS - Log Reference document for v5.6.6 only states the example field values (i.e. close, server-rst, client-rst) without any explanation, very revealing documentation indeed. What is the real difference between action=accept and action=close in v5.6.6?
Any help would be very much appreciated! PS: Two sample segments from our traffic logs for the same dstport and dstip that got action=accept and action=close respectively are provided below.
[ul]Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
You mentionned : "For the same policy,
[ul]---> this looks logical for me with 5.6.6 as there has been new log traffic messages sent to FAZ (for example) with action= accept and log id = 20 . In the log ref guide, you will see them as "LOG_ID_TRAFFIC_STAT" (Forward traffic statistics). There are used for "long sessions" (more than 2 minutes) to give some stats to the FAZ (for example) so that Fortiview would be accurate when the session is still alive.
You may see this log id = 20 as well just before the logid = 13 . In fact , when you have no traffic for some time before the TCP session is closed, then the next packet (ie TCP FIN) will trigger the log stats entry (log id = 20) and then you will see the expect log id = 13 with action close for the end of TCP session.
You indicate : "However, on some other policies, action=accept is taking logid="0000000013" as well"
Is it for TCP traffic ? If yes, more details would be needed
Hope it helps
Sounds like you have session accounting with log-start. Close is what is logged at the "closing" of the session.
http://socpuppet.blogspot.com/2018/04/fortios-set-logtraffic-start-enable.html
Ken Felix
PCNSE
NSE
StrongSwan
Hi Ken, Thank you for your reply. I checked the policy and logtraffic-start is not enabled. Only the command below is there:
set logtraffic all
Plus, our traffic logs never take action=start values and this supports my finding above. Any other ideas? We see both action=accept and action=close for successfully ended TCP connections although logtraffic-start is not enabled and action=accept should be there only for non-TCP connections (UDP etc.) according to the documentation. What is the real difference between action=accept and action=close?
emnoc wrote:Sounds like you have session accounting with log-start. Close is what is logged at the "closing" of the session.
http://socpuppet.blogspot.com/2018/04/fortios-set-logtraffic-start-enable.html
Ken Felix
Hello,
For your TCP connections, could you let me know what is the logid when you see action=close and when you see action=accept
Thanks
Hi, For the same policy,
[ul]However, on some other policies, action=accept is taking logid="0000000013" as well. On the other hand, action=close never takes logid="0000000020". Thanks
jhouvenaghel wrote:Hello,
For your TCP connections, could you let me know what is the logid when you see action=close and when you see action=accept
Thanks
You mentionned : "For the same policy,
[ul]---> this looks logical for me with 5.6.6 as there has been new log traffic messages sent to FAZ (for example) with action= accept and log id = 20 . In the log ref guide, you will see them as "LOG_ID_TRAFFIC_STAT" (Forward traffic statistics). There are used for "long sessions" (more than 2 minutes) to give some stats to the FAZ (for example) so that Fortiview would be accurate when the session is still alive.
You may see this log id = 20 as well just before the logid = 13 . In fact , when you have no traffic for some time before the TCP session is closed, then the next packet (ie TCP FIN) will trigger the log stats entry (log id = 20) and then you will see the expect log id = 13 with action close for the end of TCP session.
You indicate : "However, on some other policies, action=accept is taking logid="0000000013" as well"
Is it for TCP traffic ? If yes, more details would be needed
Hope it helps
Hi, Thank you for your detailed reply, it's very enlightening. Is it somehow possible to disable only LOG_ID_TRAFFIC_STAT (i.e. logid="0000000020")?
Thanks
jhouvenaghel wrote:You mentionned : "For the same policy,
[ul]action=accept takes logid="0000000020" action=close takes logid="0000000013"[/ul] ---> this looks logical for me with 5.6.6 as there has been new log traffic messages sent to FAZ (for example) with action= accept and log id = 20 . In the log ref guide, you will see them as "LOG_ID_TRAFFIC_STAT" (Forward traffic statistics). There are used for "long sessions" (more than 2 minutes) to give some stats to the FAZ (for example) so that Fortiview would be accurate when the session is still alive.
You may see this log id = 20 as well just before the logid = 13 . In fact , when you have no traffic for some time before the TCP session is closed, then the next packet (ie TCP FIN) will trigger the log stats entry (log id = 20) and then you will see the expect log id = 13 with action close for the end of TCP session.
You indicate : "However, on some other policies, action=accept is taking logid="0000000013" as well"
Is it for TCP traffic ? If yes, more details would be needed
Hope it helps
config log fortianalyzer filter set filter "logid(00020)" set filter-type exclude end
Thanks a lot for all the information you've provided, you're very helpful. We'll try the workaround and update this thread as soon as possible.
jhouvenaghel wrote:
If you are not interested by these statistics logs sent to the FAZ, the following workaround can be used :config log fortianalyzer filter set filter "logid(00020)" set filter-type exclude end
Hello, I have this kind of problem. We have a client that has pulse secure client to be able to access company services at home. And what happened is this one.
[ul]Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1720 | |
1093 | |
752 | |
447 | |
234 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.