FrankGuthrie wrote: » Oke, I'm see ing the following happening in the logging of my firewall:Jan 15 09:30:16 FWSM_Firewall %FWSM-6-302014: Teardown TCP connection 145183634424206519 for ACCESS:TEST-10.0.0.1/1821 to Traffic:192.168.1.1/9519 duration 0:00:20 bytes 66 SYN Timeout Does this means That device 10.0.0.1 is able to reach 192.168.1.1, but there is no reaction, hence the SYN timeout? Also I have another question about GREP. I'm issueing the following command to see the flow between both IP addresses: cat logfile | grep "10\.0\.0\.1" | grep "192\.168\.1\.1" Can I do this quicker? With other words, can I shorten this command?
EdTheLad wrote: » I would imagine it means 10.0.0.1 has sent a tcp syn packet to 192.168.1.1, the FW has recorded seeing this syn packet and added the stateful request to its database waiting to receive an ack from 192.168.1.1, since no ack was received the stateful session info was dropped. This does not tell you anything in regards to the ip connectivity between server and host.
Pupil wrote: » Are you able to use awk? Cause, awk is your best friend:awk '/10\.0\.0\.1/ && /192\.168\.1\.1/ { print }' logfile
FrankGuthrie wrote: » That works, but for now I find it to takes longer instead of using GREP twice, not sure if it will help me with shortening the command.