We have recently swapped our firewall (linux + shorewall) with a Cisco router..
Everything is working fine I think (will certanly know on Tuesday when everyone come to work again), but one thing puzzles me.. My acl for lan out traffic (from dmz and internet TO the lan computers) have a deny any any log-input entry on the last line.. I'm logging to an internal syslog server.
In the logs I see udp traffic being blocked with source on the internet and destination on out lan subnet(s). I did not know that udp traffic could go from wan to local without port forwarding. As far as I know only tcp have established connections..
Should all udp traffic from wan to local just stay blocked (maybe with a seperate non-logging acl line so out syslog server is not flooded with acl messages)
It would be nice to have everything fit to fight when everyone come to work on Tuesday
Can someone please explain why I'm seing these wan -> local traffic?
Everything is working fine I think (will certanly know on Tuesday when everyone come to work again), but one thing puzzles me.. My acl for lan out traffic (from dmz and internet TO the lan computers) have a deny any any log-input entry on the last line.. I'm logging to an internal syslog server.
In the logs I see udp traffic being blocked with source on the internet and destination on out lan subnet(s). I did not know that udp traffic could go from wan to local without port forwarding. As far as I know only tcp have established connections..
Should all udp traffic from wan to local just stay blocked (maybe with a seperate non-logging acl line so out syslog server is not flooded with acl messages)
It would be nice to have everything fit to fight when everyone come to work on Tuesday
Can someone please explain why I'm seing these wan -> local traffic?