- Products
- Learn
- Local User Groups
- Partners
-
More
Join Us for CPX 360
23-24 February 2021
Important certificate update to CloudGuard Controller, CME,
and Azure HA Security Gateways
How to Remediate Endpoint & VPN
Issues (in versions E81.10 or earlier)
IDC Spotlight -
Uplevel The SOC
Important! R80 and R80.10
End Of Support around the corner (May 2021)
Hi Folks,
We are trying to do nslook-up from out side through URL.We want see the traffic from the URL.
a)Any end user NSLOOKUP request coming from internet hitting website, It does not show logs in Firewall. Hence we are not able to detect connections as well as source IP address. We need detailed logs indicating NSLOOKUP request flow as well as Source IP details.
b)Is there any mode in Firewall for detailed log analysis. Currently limited logs are visible which may not be enough for any forensics if required.
Hi @Harish_Sankaran,
use the following cli commands
fw ctl zdebug drop | grep <source IP>
or
fw monitor -e "accept( host=<source IP>);"
to debug the traffic flow.
More to "fw monitor" could you found here:
R80.x - cheat sheet - fw monitor
I don't really see what you are trying to identify here. When I use nslookup to resolve a URL like:
nslookup www.google.com
all that will happen is that my machine will contact the configured DNS server and ask the question at which IP I can reach www.google.com, nslookup will not send any packet to www.google.com itself.
Extended logging can be set by enabling accounting.
About CheckMates
Learn Check Point
Advanced Learning
WELCOME TO THE FUTURE OF CYBER SECURITY