Book Image

OPNsense Beginner to Professional

By : Julio Cesar Bueno de Camargo
5 (1)
Book Image

OPNsense Beginner to Professional

5 (1)
By: Julio Cesar Bueno de Camargo

Overview of this book

OPNsense is one of the most powerful open source firewalls and routing platforms available. With OPNsense, you can now protect networks using features that were only previously available to closed source commercial firewalls. This book is a practical guide to building a comprehensive network defense strategy using OPNsense. You’ll start with the basics, understanding how to install, configure, and protect network resources using native features and additional OPNsense plugins. Next, you’ll explore real-world examples to gain in-depth knowledge of firewalls and network defense. You’ll then focus on boosting your network defense, preventing cyber threats, and improving your knowledge of firewalling using this open source security platform. By the end of this OPNsense book, you’ll be able to install, configure, and manage the OPNsense firewall by making the most of its features.
Table of Contents (25 chapters)
1
Section 1: Initial Configuration
6
Section 2: Securing the Network
13
Section 3: Going beyond the Firewall

Filtering log files

As we have explored in this book, one of the most valuable resources for diagnosing issues or troubleshooting is the log files. The log files are always telling the truth and learning about some CLI tools can help us filter data inside the logs and save a lot of time!

In the following, we will explore how to filter logs on OPNsense.

On the CLI, we will change our current directory to the /var/logs path, as we have learned that the logs are stored in this path.

Filtering logs

To have a continuous output of a log file, we can use the tail -f command:

root@bluebox:/var/log # tail -f system/system_`date +%Y%m%d`

Note

The `date +%Y%m%d` command will set the filename to the current date.

grep is one of the most helpful tools to filter data inside log files. We can use it to extract information more clearly:

root@bluebox:/var/log # grep --color -i error system/system_20220305.log

In the preceding example, we filter the word error inside...