SonicWALL 3 manual SonicOS Log Entries, Refresh, Clear Log, Mail Log

Models: 3

1 348
Download 348 pages 8.9 Kb
Page 318
Image 318

Log > View

SonicOS Log Entries

Each log entry contains the date and time of the event and a brief message describing the event. It is also possible to copy the log entries from the management interface and paste into a report. The SonicWALL security appliance manages log events in the following manner:

Dropped TCP, UDP, or ICMP packets

When IP packets are blocked by the SonicWALL security appliance, dropped TCP, UDP and ICMP messages are displayed. The messages include the source and destination IP addresses of the packet. The TCP or UDP port number or the ICMP code follows the IP address. Log messages usually include the name of the service in quotation marks.

Blocked Web Sites

When a computer attempts to connect to the blocked site or newsgroup, a log event is displayed. The computer’s IP address, Ethernet address, the name of the blocked Web site, and the Content Filter List Code is displayed. Code definitions for the 12 Content Filter List categories are displayed in the table below:

1.

Violence/Hate/Racism

5.

Weapons

9. Illegal Skills/Questionable Skills

 

 

 

 

 

2.

Intimate Apparel/

6.

Adult/Mature Content

10. Sex Education

 

Swimsuit

 

 

 

 

 

 

 

 

 

 

3.

Nudism

7.

Cult/Occult

11.

Gambling

 

 

 

 

 

 

4.

Pornography

8.

Drugs/Illegal Drugs

12.

Alcohol/Tobacco

 

 

 

 

 

 

Blocked Java, etc.

When ActiveX, Java or Web cookies are blocked, messages with the source and destination IP addresses of the connection attempt is displayed.

Ping of Death, IP Spoof, and SYN Flood Attacks

The IP address of the machine under attack and the source of the attack is displayed. In most attacks, the source address shown is fake and does not reflect the real source of the attack.

9Tip: Some network conditions can produce network traffic that appears to be an attack, even if no one is deliberately attacking the LAN. Verify the log messages with SonicWALL Tech Support before contacting your ISP to determine the source of the attack.

Refresh

To update log messages, clicking the Refresh button.

Clear Log

Clicking Clear Log deletes the contents of the log.

E-mail Log

If you have configured the SonicWALL security appliance to e-mail log files, clicking E-mail Log sends the current log files to the e-mail address specified in the Log > Automation > E-mailsection.

SONICWALL SONICOS STANDARD 3.0 ADMINISTRATORS GUIDE

299

Page 318
Image 318
SonicWALL 3 manual SonicOS Log Entries, Refresh, Clear Log, Mail Log