22.9 Filter Log
303
22.9 Filter Log
This log gathers information on web pages and objects blocked/allowed by the HTTP and FTP
filters (see chapters
and
) and on packets matching traffic rules with the
Log matching
packets
option enabled (see chapter
) or meeting other conditions (e.g. logging of
UPnP
traffic
— see chapter
Each log line includes the following information depending on the component which generated
the log:
•
when an HTTP or FTP rule is applied: rule name, user, IP address of the host which
sent the request, object’s URL
•
when a traffic rule is applied: detailed information about the packet that matches the
rule (rule name, source and destination address, ports, size, etc.)
Example of a URL rule log message
[18/Apr/2008 13:39:45] ALLOW URL ’McAfee update’
192.168.64.142 james HTTP GET
http://update.kerio.com/nai-antivirus/datfiles/4.x/dat-4258.zip
•
[18/Apr/2008 13:39:45]
— date and time when the event was logged
•
ALLOW
— action that was executed (
ALLOW
= access allowed,
DENY
= access denied)
•
URL
— rule type (for URL or FTP)
•
’McAfee update’
— rule name
•
192.168.64.142
— IP address of the client
•
jsmith
— name of the user authenticated on the firewall (no name is listed unless at
least one user is logged in from the particular host)
•
HTTP GET
— HTTP method used in the request
•
http:// ...
— requested URL
Packet log example
[16/Apr/2008 10:51:00] PERMIT ’Local traffic’ packet to LAN,
proto:TCP, len:47, ip/port:195.39.55.4:41272 ->
192.168.1.11:3663, flags:
ACK PSH, seq:1099972190
ack:3795090926, win:64036, tcplen:7
•
[16/Apr/2008 10:51:00]
— date and time when the event was logged
•
PERMIT
— action that was executed with the packet (
PERMIT
,
DENY
or
DROP
)
Summary of Contents for Firewall6
Page 1: ...Kerio WinRoute Firewall 6 Administrator s Guide Kerio Technologies...
Page 129: ...8 5 HTTP cache 129...
Page 404: ...404...