User guide

Chapter 12: Monitoring Firebox Activity
166 WatchGuard Firebox System
The interfaces used in this section are as follows:
eth0 - External (public) interface
eth1 - Trusted (internal) interface
eth2 - Optional (DMZ) interface
ipsec0 - IPSec virtual interface
eth0:0 - Interface alias
fbd0 - Virtual interface used for DVCP VPN tunnel negotiation
pptp0, 1, 2, etc - PPTP virtual VPN interfaces
lo - loopback interface
wgd0 - External (public) IP address when the Firebox is set up for
PPPoE support. (Because all traffic passing over this interface is
PPPoE- specific, the IP address that appears is a placeholder value
only and can be ignored.)
Routes
The Firebox kernel routing table. These routes are used to
determine which interface the Firebox uses for each destination
address.
Routes
Kernel IP routing table
Destination Gateway Genmask Flags MSS Window Use Iface
207.54.9.16 * 255.255.255.240 U 1500 0 58 eth0
207.54.9.48 * 255.255.255.240 U 1500 0 19 eth1
198.148.32.0 * 255.255.255.0 U 1500 0 129 eth1:0
127.0.0.0 * 255.0.0.0 U 3584 0 9 lo
default 207.54.9.30 * UG 1500 0 95 eth0
ARP table
A snapshot of the ARP table on the running Firebox. The ARP
table is used to map IP addresses to hardware addresses.
ARP Table
Address HWtype HWaddress Flags Mask Iface
207.23.8.32 ether 00:20:AF:B6:FA:29 C * eth1
207.23.8.52 ether 00:A0:24:2B:C3:E6 C * eth1
207.23.8.21 ether 00:80:AD:19:1F:80 C * eth0
201.148.32.54 ether 00:A0:24:4B:95:67 C * eth1:0
201.148.32.26 ether 00:A0:24:4B:98:7F C * eth1:0
207.23.8.30 ether 00:A0:24:79:96:42 C * eth0
For more information on the status report page, see the following FAQ:
https://support.watchguard.com/advancedfaqs/log_statusall.asp