ProSecure Unified Threat Management (UTM) Appliance Reference Manual

Table C-18. Content Filtering and Security Logs: Web Filtering and Content Filtering

Message

2009-08-01 00:00:01 HTTP 192.168.1.3 192.168.35.165

 

http://192.168.35.165/testcases/files/virus/normal/%b4%f3%d3%da2048.rar

 

Proxy Block

 

 

Explanation

Logs that are generated when Web content is blocked because it uses a proxy.

 

The message shows the date and time, protocol, client IP address, server IP

 

address, URL, reason for the action, and action that is taken.

 

 

Recommended Action

None

 

 

Message

2009-08-01 00:00:01 HTTP 192.168.1.3 192.168.35.165

 

http://192.168.35.165/testcases/files/virus/normal/%b4%f3%d3%da2048.rar

 

Keyword Block

 

 

Explanation

Logs that are generated when Web content is blocked because it violates a

 

blocked keyword. The message shows the date and time, protocol, client IP

 

address, server IP address, URL, reason for the action, and action that is

 

taken.

 

 

Recommended Action

None

 

 

Spam Logs

This section describes logs that are generated when the UTM filters spam e-mail messages.

Table C-19. Content Filtering and Security Logs: Spam

Message

2009-02-28 23:59:59 SMTP 192.168.1.2 192.168.35.165

 

xlzimap@test.com xlzpop3@test.com Blocked by customized blacklist. 0

 

RBL Block

 

 

Explanation

Logs that are generated when spam messages are blocked by the RBL. The

 

message shows the date and time, protocol, client IP address, server IP

 

address, sender, recipient, subject line, mechanism that detected the spam,

 

and action that is taken.

 

 

Recommended Action

None

 

 

Message

2009-02-28 23:59:59 SMTP 192.168.1.2 192.168.35.165

 

xlzimap@test.com xlzpop3@test.com Blocked by customized blacklist. 0

 

Heuristic Block

 

 

Explanation

Logs that are generated when spam messages are blocked by Distributed

 

Spam Analysis. The message shows the date and time, protocol, client IP

 

address, server IP address, sender, recipient, subject line, mechanism that

 

detected the spam, and action that is taken.

 

 

Recommended Action

None

 

 

System Logs and Error Messages

C-13

v1.0, January 2010

Page 457
Image 457
NETGEAR UTM5-100NAS, UTM50-100NAS manual Spam Logs, Table C-19. Content Filtering and Security Logs Spam