I have a rich firewalld rule with a "log" option:
# firewall-cmd --list-rich-rules
< ... >
rule family="ipv4" forward-port port="[port]" protocol="tcp"
to-port="[port]" to-
addr="[ip addr]" log level="info" limit value="[log
frequency]"
Actual numbers changed to protect the guilty.
I cannot find anything being logged, anywhere. According to
firewalld.richlanguage, this should get logged to syslog. The default
rsyslog.conf specifies all info-level messages going to /var/log/messages:
.info;mail.none;authpriv.none;cron.none /var/log/messages
Port forwarding is working, but even when I hit the port I see nothing get
logged.
Just on the lark, I also tried 'journalctl -f", and nothing shows up there,
either.
firewalld is using the netfilters backend.
After some head-banging, and copious searching:
# nft list table inet firewalld
I found this in the output:
chain nat_PRE_FedoraServer_allow {
meta nfproto ipv4 tcp dport [port] dnat ip to [host:port]
}
I see nothing here that suggests that anything is going to get logged.
So, I'm just guessing that firewall-cmd either does not implement the log
option, in the net-filter back-end, or the net-filter back-end simply does
not implement any kind of logging (which seems unlikely).
Anyone know anything more on this?