If you’re tired of seeing your /var/log/messages log file full of dropped traffic from APF firewall then we have a solution! We’ll create a separate log file for TCP/UDP OUTPUT and drops which will leave your messages log nice and clean for easy browsing!
Requirements:
APF Firewall 0.9.6 or above. It may work on previous versions but we haven’t tested. If you’re using an older version you should upgrade anyways. Install APF by following our firewall tutorial.
Changing APF’s configuration:
1) Login to your server and su to root shell.
2) Create a new log file just for the TCP/UDP output/drops from APF.
touch /var/log/iptables
Set user permissions to restrict access.
chmod 600 /var/log/iptables
3) Change the syslog so it will tell iptables to use your new log file.
First lets make a backup to be safe:
cp /etc/syslog.conf /etc/syslog.conf.bak
pico /etc/syslog.conf
4) Add the following line at the bottom
# Send iptables LOGDROPs to /var/log/iptables
kern.=debug /var/log/iptables
5) Save the changes, ctrl + X then Y
6) Reload the syslogd service for the change to take effect.
/sbin/service syslog reload
7) Open APF and edit the configuration.
First lets make a backup to be safe:
pico /etc/apf/conf.apf
Find the following:
# What log level should we send all log data too?
# refer to syslog.conf for levels
LOG_LEVEL="crit"
change to:
# What log level should we send all log data too?
# refer to syslog.conf for levels
LOG_LEVEL="debug"
8) Save the changes.
Ctrl + X then Y
9) Restart apf for the changes to take effect.
/etc/apf/apf –r
10) Make sure the new log file is getting written to:
tail –f /var/log/iptables
You should see things like:
Aug 27 15:48:31 fox kernel: IN=eth0 OUT= MAC=00:0d:61:37:76:84:00:d0:02:06:08:00:08:00 SRC=192.168.1.1 DST=192.168.1.1 LEN=34 TOS=0x00 PREC=0x00 TTL=118 ID=57369 PROTO=UDP SPT=4593 DPT=28000 LEN=14
Also check the messages log to make sure APF still isn’t writing to it.
tail –f /var/log/messages
Requirements:
APF Firewall 0.9.6 or above. It may work on previous versions but we haven’t tested. If you’re using an older version you should upgrade anyways. Install APF by following our firewall tutorial.
Changing APF’s configuration:
1) Login to your server and su to root shell.
2) Create a new log file just for the TCP/UDP output/drops from APF.
touch /var/log/iptables
Set user permissions to restrict access.
chmod 600 /var/log/iptables
3) Change the syslog so it will tell iptables to use your new log file.
First lets make a backup to be safe:
cp /etc/syslog.conf /etc/syslog.conf.bak
pico /etc/syslog.conf
4) Add the following line at the bottom
# Send iptables LOGDROPs to /var/log/iptables
kern.=debug /var/log/iptables
5) Save the changes, ctrl + X then Y
6) Reload the syslogd service for the change to take effect.
/sbin/service syslog reload
7) Open APF and edit the configuration.
First lets make a backup to be safe:
pico /etc/apf/conf.apf
Find the following:
# What log level should we send all log data too?
# refer to syslog.conf for levels
LOG_LEVEL="crit"
change to:
# What log level should we send all log data too?
# refer to syslog.conf for levels
LOG_LEVEL="debug"
8) Save the changes.
Ctrl + X then Y
9) Restart apf for the changes to take effect.
/etc/apf/apf –r
10) Make sure the new log file is getting written to:
tail –f /var/log/iptables
You should see things like:
Aug 27 15:48:31 fox kernel: IN=eth0 OUT= MAC=00:0d:61:37:76:84:00:d0:02:06:08:00:08:00 SRC=192.168.1.1 DST=192.168.1.1 LEN=34 TOS=0x00 PREC=0x00 TTL=118 ID=57369 PROTO=UDP SPT=4593 DPT=28000 LEN=14
Also check the messages log to make sure APF still isn’t writing to it.
tail –f /var/log/messages
No comments:
Post a Comment