This thread is ongoing, but let me start with the results I have from a year worth of dropped firewall connections.
Let’s jump back a minute. I am importing firewall logs for dropped connections into a MS SQL Database. September as you can see is a fun month with 2,096,766 records.
Since my firewall is a Zyxel device, I gave a look at the .csv delimited log output. Easily enough you can use a Data Import Wizard to spin the logs into some tables. Rough table to log structure is as such:
CREATE TABLE zy_2016-09 ( time VARCHAR(50) NULL, source VARCHAR(50) NULL, destination VARCHAR(50) NULL, priority VARCHAR(50) NULL, category VARCHAR(50) NULL, note VARCHAR(50) NULL, sour_interface VARCHAR(50) NULL, dest_interface VARCHAR(50) NULL, protocol VARCHAR(50) NULL, message VARCHAR(250) NULL, col00 VARCHAR(250) NULL,
I am having fun crawling some output. Typically it’s some sort of fancy OpSec to not say your type of network gear, but this is meant to be informative and hopefully helpful.
So let’s crawl some queries and output in the next post.
Source: FTB Threads