Advisory: Support Portal Maintenance. Login is currently unavailable, more info available here.
I enabled DOS Protection and since then every minute sophos is droping some TCP traffic and sometimes UDP, I'm sure Im not getting attacked and just need to add a DOS bypass rule. My question is where in Sophos XG v18 can in find the Source and destination details of traffic that has been dropped because of the DOS protection. FYI, I've never used a firewall before and my first one is this so sorry it its a basic question. I can see logs and current activity and sure there must be some way to filter it to find this but not sure how.
Hi Michael007 from Intrusion Prevention >> DoS Attacks
DoS attack status allows you to see if traffic limits have been applied and the amount of data dropped after the limit has been exceeded. The firewall applies the traffic limits specified in DoS settings and logs the corresponding events. Data is available for the source and destination in real-time.
For Configuration and in-depth details, I would recommend you to check the article - https://community.sophos.com/kb/en-us/123182
KeyurCommunity Support Engineer | Sophos Support Sophos Support Videos | Knowledge Base | @SophosSupport | Sign up for SMS Alerts | If a post solves your question use the 'This helped me' link
Thanks for the quick reply, that will definitely help with UDP.
For TCP Flood i noticed that in your picture and also on my firewall that the hyperlink to view the details is not available. Is there anything for the TCP Flood side?
Hi Michael007 SYN/TCP Flood: A SYN flood is when a host sends a flood of TCP/SYN packets, often with a forged sender address. Every packet is handled like a connection request; this causes the server to spawn a half-open connection because it sends back a TCP/SYN-ACK packet (Acknowledge) and waits for a packet in response from the sender address (the response to the ACK Packet). However, as the sender's address is forged, the response never comes. These half-open connections occupy the number of available connections the server is able to make and keep it from responding to legitimate requests until after the attack ends.If any IP detects under flooding will be visible under SYN flood as TCP and SYN are part of the same mechanism, moreover, we do not recommend to apply TCP flood until it specifically required and directed by the support, I will try to collect further info on TCP flood tab and share with you if there is a different behavior.
Thanks Keyur, will disable the TCP flood for now and monitor the UDP with the method you mention, appreciate your help
Hi Michael007 Please reach out to us if you need further assistance. We will glad to assist you further.
Can i view more detailed information in the Logfiles? which logs would that be? i did not find anything about DoS yet.
You are able to see the drops live in drop packet capture.
(drppkt on Advanced shell, or drop-packet-capture on console).
and if i want to see historic drops from a few day or hours ago?
Thats not possible in the historic way. At least in such detailed way.
Correct me if i am wrong but on UTM it used to be visible right?I would like to see ip src and dst as well as ports for troubleshooting and fine-tuning protection
You could easily create such a report by yourself, if you need the data for some reasons.
use # drppkt | grep -i dos > /tmp/dos.log &
This will forward all traffic dropped by dos protection directly to the log.
Kill the command with ps | grep drppkt --> kill -9 processID
Personally i am not a big fan of DDOS Flood protection, as they cause more issues than actually stop anything. Most systems nowadays have protections against Flood attacks within the tcp/ip stack.