Sophos XG has the ability to capture and display actual network packet information right from the management web interface. This is a great tool to determine what is actually happening "on the wire". Unlike firewall logs that can be turned off or configured to exclude logging of some traffic, a packet capture literally shows you every packet that the firewall has to process. Let's have a look at how to enable Sophos XG packet capture.
In this example, I will show you how to determine if Sophos XG is sending syslog messages to Fastvue Sophos Reporter. This is a handy troubleshooting step if you're not seeing any data flowing into Fastvue Sophos Reporter (for other troubleshooting steps, please see our support article).
After a few second click Refresh to see if any results are shown. If a number of packets have been collected you can toggle the switch to stop the capture.
Previously we specified the IP address of the Fastvue server as a capture filter. We did this to only capture packets to and from that device. From the image below you can see that a packet capture shows a lot more detail than a log entry would. You can see both in and outbound request for the web browsing on port 80.
In our case, we only want to see traffic where the Fastvue server is the destination, and we only want to see syslog traffic on Port 514. To filter the view:
Note: Since the traffic we are looking for is UDP, we do not expect any return or ACK messages. If we were looking for TCP traffic, we would expect to see those like we did in the TCP Port 80 example. With UDP, you know that a packet was sent but there is no way to know if it arrived without checking the destination.
We've seen that there are packets flowing from the XG device to the Fastvue server on UDP Port 514. So it looks like syslog messages are correctly being sent. We can take it a step further and confirm that the messages themselves are legitimate syslog records.
By looking at the Packet Information you can see that it does look like a legitimate syslog message.
Looking the HEX & ASCII Detail you can see content that looks like it is part of the web traffic log.
The ASCII portion of this packet - once normalized looks like this:
<30>device="SFW".date=2018-02-08.time=15:06:23.timezone="SAST".device_name="SFVH".device_id=C01001FTWG73X1E.log_id=010101600001.log_type="Firewall".log_component="Firewall.Rule" .log_subtype="Allowed".status="Allow".priority=Information.duration=72.fw_rule_id=1.policy_type=1.user_name="".user_gp="".iap=5.ips_policy_id=1.appfilter_policy_id=5 .application="".application_risk=0.application_technology="".application_category="".in_interface="Port1".out_interface="".src_mac=00:.0:00:.0:00:.0.src_ip=192.168.1.11 .src_country_code=R1.dst_ip=184.108.40.206.dst_country_code=USA.protocol="TCP".src_port=54786.dst_port=80.sent_pkts=4..recv_pkts=2.sent_bytes=184.recv_bytes=92 .tran_src_ip=.tran_src_port=0.tran_dst_ip=192.168.1.1.tran_dst_port=8080.srczonetype="LAN".srczone="LAN".dstzonetype="WAN".dstzone="WAN".dir_disp="". connevent="Stop".connid="982124576".vconnid="".hb_health="No.Heartbeat".message="".appresolvedby="S
This is a syslog message containing a firewall log entry event. At this point in time, we know what the Sophos XG is generating syslog packets and sending them to the Fastvue server.
Sophos XG's packet capture feature is a very useful tool when it comes troubleshooting connectivity issues. It provides a deeper level of information compared to looking at firewall log files. This is especially true in cases such as the one above, where there are no explicit traffic rules defined and limited visibility in the UI for the syslog traffic.
This article was focused on troubleshooting syslog traffic being sent from Sophos XG to the Fastvue Sophos Reporter server, but these same principles can be applied in other troubleshooting scenarios too.
Download our FREE 30-day trial, or schedule a demo and we'll show you how it works.
How to Enable Dark Mode in Fortinet FortiGate (FortiOS 7.0)
Sophos XG - How to Block Searches and URLs with Specific Keywords