This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

XG does not detect ATP that has been detected by UTM

We just received an alert from an upstream SG UTM Firewall that the downstream XG firewall was blocked by SG due to ATP.

This is DNS traffic towards namecheap DNS servers. Probably for for718-whileteam__heldlead__com (__ is a dot .)

2021:04:09-13:11:07 fw-320-2 afcd[5066]: id="2022" severity="warn" sys="SecureNet" sub="packetfilter" name="Packet dropped (ATP)" srcip="XG-firewall-IP" dstip="198.54.117.254" fwrule="63001" proto="17" threatname="C2/Generic-A" status="1" host="198.54.117.198" url="-" action="drop"
2021:04:09-13:12:20 fw-320-2 afcd[5066]: id="2022" severity="warn" sys="SecureNet" sub="packetfilter" name="Packet dropped (ATP)" srcip="XG-firewall-IP" dstip="198.54.117.253" fwrule="63001" proto="17" threatname="C2/Generic-A" status="1" host="198.54.117.198" url="-" action="drop"

This is probably traffic generated by the XG trying to resolve some Host for internal requests trough the namecheap DNS servers.

My questions:

1. why is XG doing something that SG says is insecure? It should block malware DNS itself like SG does. ATP on XG is enabled (Mode: Inspect untrusted content. For optimal performance, inspect only untrusted content.)

2. now please tell me how to find the originating internal IP in the XG logs that tries to DNS trough XG? This in invisible in firewall logs. Or is there a hidden DNS resolver log on XG?



This thread was automatically locked due to age.
  • If you move the Logviewer to advanced view and look for this IP, do you see the connection or not? 

    XG does not store all DNS lookups, as those lookup would result in to many database storage. 

    __________________________________________________________________________________________________________________

  • What is advanced view in logviewer?

    Probably "Inspect untrusted content" is unsuitable in our situation.

    XG does not detect anything in ATP. It actually never did.

  • Detailed View or advanced View is the other view in logviewer on the left site in your screenshot. 

    It will show all the syslog entries. 

    Usually i recommend to activate inspect all content, if the appliance has enough performance to do so. 

    __________________________________________________________________________________________________________________

  • ah ok, the detailed view.

    no, does not have an entry for this dst IP

    i changed ATP on XG from untrusted to scan all.

    then did a nslookup towards the XG to resolve for718-whileteam__heldlead__com

    > for718-whileteam.heldlead.com
    Server:  XG
    Address:  XG-IP

    *** for718-whileteam.heldlead.com wurde vonXG nicht gefunden: Non-existent domain.

    XG does not log an ATP alert at all.

    upstream SG does ATP block but does not even log a source IP in live view. In log file I see

    2021:04:12-10:08:36 fw-320-2 named[3300]: rpz: client @0x8d19e88 XG-IP#19900 (for718-whileteam.heldlead.com): view default: rpz IP NXDOMAIN rewrite for718-whileteam.heldlead.com via 32.198.117.54.198.rpz-ip.rpz

    This is overall a real strange ATP situation

  • Can you verify on a tcpdump level, this DNS request actually is proceeded by XG? Because it should shown on XG as well and prevent this. 

    Using tcpdump -ni any port 53 and redo the nslookup. 

    __________________________________________________________________________________________________________________

  • it does

    	Line 1506: 10:27:43.087747 tun0, IN: IP CLIENT-IP.61050 > XG-IP.53: 6+ A? for718-whileteam.heldlead.com.internaldomain. (62)
    	Line 1536: 10:27:43.155323 tun0, IN: IP CLIENT-IP.61051 > XG-IP.53: 7+ AAAA? for718-whileteam.heldlead.com.internaldomain. (62)
    	Line 1542: 10:27:43.207892 tun0, IN: IP CLIENT-IP.61052 > XG-IP.53: 8+ A? for718-whileteam.heldlead.com. (47)
    	Line 1543: 10:27:43.207994 lag0, OUT: IP XG-IP.49721 > UPSTREAM-SG-IP.53: 43942+ A? for718-whileteam.heldlead.com. (47)
    	Line 1544: 10:27:43.207996 PortA3, OUT: IP XG-IP.49721 > UPSTREAM-SG-IP.53: 43942+ A? for718-whileteam.heldlead.com. (47)
    	Line 1548: 10:27:43.293823 tun0, IN: IP CLIENT-IP.61053 > XG-IP.53: 9+ AAAA? for718-whileteam.heldlead.com. (47)
    	Line 1549: 10:27:43.293916 lag0, OUT: IP XG-IP.27974 > UPSTREAM-SG-IP.53: 20913+ AAAA? for718-whileteam.heldlead.com. (47)
    	Line 1550: 10:27:43.293919 PortA3, OUT: IP XG-IP.27974 > UPSTREAM-SG-IP.53: 20913+ AAAA? for718-whileteam.heldlead.com. (47)

  • I guess i see the problem. The Windows client is altering the DNS requests, which result in a skip of the detection. You see, your own Domain is added in the initial request. Hence the ATP is not able to figure out, what domain this is. 

    https://serverfault.com/questions/74067/windows-appending-domain-suffix-to-all-lookups

    If you disable this, ATP on XG should be able to block this. 

    __________________________________________________________________________________________________________________

  • Hi,

    thanks. I removed the internal domain from the log above. Thanks for pointing this out.

    This is normal behaviour of Windows DNS to add internal Domain on the first attempt.

    This is not a problem here. The upstream firewall only receives the real domain without internal domain added.

    The ATP on upstream SG is only for for718-whileteam.heldlead.com

  • And XG would detect the same, if it would receive the same request, which it does not. If you disable this option for a test, it should detect this. 

    __________________________________________________________________________________________________________________

  • it does

       Line 1542: 10:27:43.207892 tun0, IN: IP CLIENT-IP.61052 > XG-IP.53: 8+ A? for718-whileteam.heldlead.com. (47)

    support case?