30.01.2015 Views

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

Administrator's Guide - Kerio Software Archive

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

22.11 Security Log<br />

An example of Http log record in the Squid format:<br />

1058444114.733 0 192.168.64.64 TCP_MISS/304 0<br />

GET http://www.squid-cache.org/ - DIRECT/206.168.0.9<br />

• 1058444114.733 — timestamp (seconds and milliseconds since January 1st, 1970)<br />

• 0 — download duration (not measured in <strong>Kerio</strong> Control, always set to zero)<br />

• 192.168.64.64 — IP address of the client (i.e. of the host from which the client is<br />

connected to the website)<br />

• TCP_MISS — the TCP protocol was used and the particular object was not found in<br />

the cache (“missed”). <strong>Kerio</strong> Control always uses this value for this field.<br />

• 304 — return code of the HTTP protocol<br />

• 0 — transferred data amount in bytes (HTTP object size)<br />

• GET http://www.squid-cache.org/ — the HTTP request (HTTP method and URL<br />

of the object)<br />

• DIRECT — the WWW server access method (<strong>Kerio</strong> Control always uses direct access)<br />

• 206.168.0.9 — IP address of the WWW server<br />

22.11 Security Log<br />

A log for security-related messages. Records of the following types may appear in the log:<br />

1. Intrusion prevention system logs<br />

Records of detected intrusions or traffic from IP addresses included in web databases of<br />

known intruders (blacklists) — for details, see chapter 8.1.<br />

301

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!