I am experimenting a bit with remote syslog and firewall logging and stumbled across this:
Drop is generated by issuing nmap -Pn -sS yyy.yyy.yyy.yyy -p 1234 at xxx.xxx.xxx.xxx. What I find odd is that it will log two times even with only a single scan. I have not experienced this with other types of routers/firewall where it will only log 1 line. Is this normal behavior?
Code:
Mar 17 02:02:14 server kernel: DROP <4>DROP IN=eth0 OUT= MAC=08:60:6f:21:b6:f0:68:ef:bd:85:a6:d9:08:00 <1>SRC=xxx.xxx.xxx.xxx DST=yyy.yyy.yyy.yyy <1>LEN=44 TOS=0x00 PREC=0x00 TTL=39 ID=808 PROTO=TCP <1>SPT=57233 DPT=1234 SEQ=2861804318 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 OPT (020405B4)
Mar 17 02:02:15 server kernel: DROP <4>DROP IN=eth0 OUT= MAC=08:60:6f:21:b6:f0:68:ef:bd:85:a6:d9:08:00 <1>SRC=xxx.xxx.xxx.xxx DST=yyy.yyy.yyy.yyy <1>LEN=44 TOS=0x00 PREC=0x00 TTL=39 ID=34783 PROTO=TCP <1>SPT=57234 DPT=1234 SEQ=2861738783 ACK=0 WINDOW=1024 RES=0x00 SYN URGP=0 OPT (020405B4
Drop is generated by issuing nmap -Pn -sS yyy.yyy.yyy.yyy -p 1234 at xxx.xxx.xxx.xxx. What I find odd is that it will log two times even with only a single scan. I have not experienced this with other types of routers/firewall where it will only log 1 line. Is this normal behavior?