Hi guys,
we are a little WISP in Italy, we need to log all traffic, we do with this script:
/system logging action
set 3 bsd-syslog=yes remote=192.168.13.2 src-address=192.168.13.1
add bsd-syslog=yes name=SendToSyslog remote=192.168.13.2 src-address=192.168.13.1 syslog-facility=local1 target=remote
/system logging
set 0 disabled=yes
set 1 topics=error,!ovpn
add action=remote topics=info
add action=SendToSyslog prefix=LogUsers topics=firewall
add action=disk topics=info,!firewall
/ip firewall mangle
add action=log chain=forward comment="Log Dstr A" connection-state=new log-prefix="Dstr A" src-address=ip_private_A/24
add action=log chain=forward comment="Log Dstr B" connection-state=new log-prefix="Dstr B" src-address=ip_private_B/24
and so on ...
The problem is that when we get the email for infringement of copyright sometimes we are able to find the connection, sometimes no!!
The strange thing is that on log we find some entries like:
forward:<interface> src-mac <macaddress>, proto TCP (SYN), ip_private:portA -> ip_public:portB, len 52
In this case where is the NAT translation log? No way to find the NAT neither looking for ip_private_portA before this entry.
If the email comes from companies like that, may ok if we do not find the connection, the problem is when police will require this info ...
Please help!!
What is the configuration you use in order to log all the traffic? Are you able to identify all the connections?