freeGuard 100 Log Message Reference
i
TABLE OF CONTENTS
1 GENERAL INFORMATION..................................................................................................................1
1.1 OVERVIEW......................................................................................................................................1
1.2 ABOUT THIS DOCUMENT...................................................................................................................1
1.3 DOCUMENT CONVENTIONS ..............................................................................................................1
1.4 FREEGUARD 100 DOCUMENTATION..................................................................................................2
1.5 CUSTOMER SERVICE AND TECHNICAL SUPPORT.................................................................................2
2 LOGGING CONFIGURATION OVERVIEW.........................................................................................4
2.1 LOG CONFIG....................................................................................................................................4
2.1.1 LOG SETTING OPTIONS...........................................................................................................4
2.1.2 CONFIGURING LOG SETTINGS.................................................................................................4
2.1.3 ALERT EMAIL OPTIONS ...........................................................................................................5
2.1.4 CONFIGURING ALERT EMAIL....................................................................................................6
2.1.5 LOG FILTER OPTIONS .............................................................................................................6
2.1.6 CONFIGURING LOG FILTERS....................................................................................................7
2.1.7 ENABLING TRAFFIC LOGGING..................................................................................................7
2.2 LOG ACCESS...................................................................................................................................8
2.2.1 VIEWING LOG MESSAGES .......................................................................................................8
2.2.2 SEARCHING LOG MESSAGES...................................................................................................9
3 LOG FORMATS .................................................................................................................................11
3.1 LOG HEADER.................................................................................................................................11
3.1.1 LOG TYPES AND SUB-TYPES .................................................................................................11
3.1.2 LOGGING SEVERITY LEVELS..................................................................................................12
3.1.3 LOG HEADER FORMAT VARIATIONS ........................................................................................13
3.2 LOG BODY.....................................................................................................................................13
3.2.1 TRAFFIC LOG BODY..............................................................................................................14
3.2.2 EVENT LOG BODY ................................................................................................................15
3.2.3 CONTENT ARCHIVE BODY .....................................................................................................15
3.2.4 ANTIVIRUS LOG BODY ..........................................................................................................15
3.2.5 ATTACK LOG BODY...............................................................................................................16
3.2.6 WEB FILTER LOG BODY.........................................................................................................16
3.2.7 SPAM FILTER LOG BODY .......................................................................................................16
4 LOG MESSAGES ..............................................................................................................................17
4.1 TRAFFIC LOG MESSAGES ...............................................................................................................17
4.1.1 ALLOWED............................................................................................................................17
4.1.2 VIOLATION...........................................................................................................................17
4.2 EVENT LOG MESSAGES..................................................................................................................18
4.2.1 SYSTEM..............................................................................................................................18
4.2.2 IPSEC ................................................................................................................................27
4.2.3 DHCP................................................................................................................................28
4.2.4 PPP...................................................................................................................................29
4.2.5 ADMIN.................................................................................................................................31
4.2.6 HA .....................................................................................................................................38
4.2.7 AUTH..................................................................................................................................39
4.3 ANTIVIRUS LOG MESSAGES ............................................................................................................40
4.3.1 INFECTED............................................................................................................................40
4.4 ATTACK LOG MESSAGES.................................................................................................................40
4.4.1 SIGNATURE .........................................................................................................................40
4.4.2 ANOMALY............................................................................................................................41