10-17-2010 07:56 PM
Please forgive me I am new to Juniper but I have kind of a lame question. I come from the Cisco world Cisco ASA/PIX devices have a default deny policy (if there is an access-list applied to an interface). If I have normal informational-level logging enabled on a device, a log message is generated for pretty much every packet that matches this default deny. In the world of Juniper it appears a little bit different. The only way I've found to have my SRX log a dropped packet is by doing something like:
"set security policies from-zone ucpd-backend-switch-management to-zone ucpd-outside policy tacacs then log session-init"
So I guess I have two questions;
1) Are policies in JunOS/SRX applied in a top-down order?
2) Is there a way to log all dropped packets? Do I have to explicitly create a policy to match all source and all destinations for every zone, then enable logging for that specific policy?
I basically want to generate a log message like this for all dropped packets on all zones/interfaces:
Oct 17 05:02:51 10.4.224.20 RT_FLOW: RT_FLOW_SESSION_CREATE: session created 188.8.131.52/1->184.108.40.206/21397 icmp 220.127.116.11/1->18.104.22.168/21397 None None 1 icmp_traffic ucpd-outside ucpd-ssl-vpn-outside 63172Oct 17 05:02:55 10.4.224.20 RT_FLOW: RT_FLOW_SESSION_CLOSE: session closed response received: 22.214.171.124/1->126.96.36.199/21397 icmp 188.8.131.52/1->184.108.40.206/21397 None None 1 icmp_traffic ucpd-outside ucpd-ssl-vpn-outside 63172 1(76) 1(76) 0
Solved! Go to Solution.