Skip to main content

Monitoring UFW Logs for Blocked Connections

This guide provides instructions on how to monitor UFW (Uncomplicated Firewall) logs to detect and view blocked connections in real-time. This is useful for troubleshooting and ensuring that your firewall rules are working as expected.

Steps to Monitor UFW Logs

Step 1: Open the Terminal

Begin by opening the terminal on your system. You can do this by pressing Ctrl + Alt + T or by navigating to the terminal application from the system menu.

Step 2: Use the tail Command with grep

Use the tail command combined with grep to filter and display real-time UFW log entries that contain the word 'BLOCK'. This command will continuously monitor the UFW log file and highlight any blocked connections.

sudo tail -f /var/log/ufw.log | grep 'BLOCK'

Explanation of the Command:

  • sudo: Runs the command with superuser privileges, which is necessary to access the UFW log file.
  • tail -f /var/log/ufw.log: Continuously displays new entries appended to the UFW log file.
  • grep 'BLOCK': Filters the output to show only lines containing the word 'BLOCK'.

Example Output

When you run the command, you will see output similar to the following for each blocked connection:

Jun 10 12:34:56 hostname kernel: [UFW BLOCK] IN=eth0 OUT= MAC=xx:xx:xx:xx:xx:xx SRC=192.168.1.100 DST=192.168.1.101 LEN=60 TOS=0x00 PREC=0x00 TTL=64 ID=54321 DF PROTO=TCP SPT=12345 DPT=80 WINDOW=14600 RES=0x00 SYN URGP=0

Explanation of the Output:

  • Jun 10 12:34:56: The date and time of the log entry.
  • hostname: The hostname of the system.
  • kernel: Indicates that the message is from the kernel.
  • [UFW BLOCK]: Shows that this entry is a blocked connection by UFW.
  • IN=eth0: The network interface where the packet was received.
  • SRC=192.168.1.100: The source IP address of the blocked connection.
  • DST=192.168.1.101: The destination IP address of the blocked connection.
  • PROTO=TCP: The protocol used (e.g., TCP).
  • SPT=12345: The source port of the blocked connection.
  • DPT=80: The destination port of the blocked connection.

Summary

By using the tail command with grep, you can efficiently monitor UFW logs in real-time to detect and analyze blocked connections. This is a valuable technique for maintaining and troubleshooting your firewall configuration.


For more advanced monitoring and log analysis, consider using log management tools or setting up more complex filtering and alerting mechanisms.