21.1 Monitoring and storage of statistic data
255
is represented by several files on the disk. This implies that any data is kept in the cache even
if the WinRoute Firewall Engine is stopped or another problem occurs (failure of power supply,
etc.) though not having been stored in the database yet.
The statistics use data from the main database. This implies that current traffic of individual
users is not included in the statistics immediately but when the started period expires and the
data is written in the database.
Note: Data in the database used for statistics cannot be removed manually (such action would
be meaningless). In statistics, it is possible to switch into another view mode where data is
related only to a period we need to be informed about. If you do not wish to keep older data,
it is possible to change the statistics storage period (see above).
Requirements of the statistics
The following conditions must be met for correct function of all statistics:
The firewall should always require user authentication. The statistics by individual
users would not match the true state if unauthenticated users are allowed to access
the Internet. For details see chapter 10.
For statistics on visited websites, it is necessary that a corresponding protocol inspec-
toris applied to any HTTP traffic. Thiscondition is met by default unless special traffic
rules disabling the particular protocol inspector are applied (see chapter 7.7).
If the WinRoute proxy server is used, visited pages are monitored by the proxy server
itself (see chapter 8.4).
Note: HTTPS traffic is encrypted and, therefore, it is impossible to monitor visited sites
and categories. Only volume of transferred data is included in the statistics for such
traffic.
For monitoring of web categories of visited websites, the Kerio Web Filter module must
be enabled. In its configuration, the Categorize each page regardless of HTTP rules
option should be enabled, otherwise web categories statistics would be unreliable. For
details, see chapter 12.3.
Gathering of statistical information and mapped services
Connections from the Internet to mapped services on local hosts (or to services on the firewall
available from the Internet — see chapter 7.3) are also included in user statistics. If a user is
connected to the firewall from the particular host, access to the mapped service is considered
as an activity of this user. Otherwise, such connection is included in activity of unknown users
(users who are not logged in).
Thefollowing example helps recognize importance of this feature. Userjsmith is authenticated
at the firewall and connected to it from a local workstation. The RDP service for this host is
mapped on the firewall, allowing the user to work remotely on the workstation. If user jsmith
connects from the Internet to the remote desktop on the workstation, this connection (and
data transferred within the connection) will be correctly included in the user’s statistics and
quota.