This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

XG does not detect ATP that has been detected by UTM

We just received an alert from an upstream SG UTM Firewall that the downstream XG firewall was blocked by SG due to ATP.

This is DNS traffic towards namecheap DNS servers. Probably for for718-whileteam__heldlead__com (__ is a dot .)

2021:04:09-13:11:07 fw-320-2 afcd[5066]: id="2022" severity="warn" sys="SecureNet" sub="packetfilter" name="Packet dropped (ATP)" srcip="XG-firewall-IP" dstip="198.54.117.254" fwrule="63001" proto="17" threatname="C2/Generic-A" status="1" host="198.54.117.198" url="-" action="drop"
2021:04:09-13:12:20 fw-320-2 afcd[5066]: id="2022" severity="warn" sys="SecureNet" sub="packetfilter" name="Packet dropped (ATP)" srcip="XG-firewall-IP" dstip="198.54.117.253" fwrule="63001" proto="17" threatname="C2/Generic-A" status="1" host="198.54.117.198" url="-" action="drop"

This is probably traffic generated by the XG trying to resolve some Host for internal requests trough the namecheap DNS servers.

My questions:

1. why is XG doing something that SG says is insecure? It should block malware DNS itself like SG does. ATP on XG is enabled (Mode: Inspect untrusted content. For optimal performance, inspect only untrusted content.)

2. now please tell me how to find the originating internal IP in the XG logs that tries to DNS trough XG? This in invisible in firewall logs. Or is there a hidden DNS resolver log on XG?



This thread was automatically locked due to age.