Cisco Cisco Web Security Appliance S170 사용자 가이드

다운로드
페이지 734
 
25-38
Cisco IronPort AsyncOS 7.5.7 for Web User Guide
Chapter 25      Logging
Traffic Monitor Log
Traffic Monitor Log
The L4 Traffic Monitor log file provides a detailed record of monitoring activity. You can view L4 Traffic 
Monitor log file entries and track updates to firewall block lists and firewall allow lists. Consider the 
following example log entries:
Example 1
172.xx.xx.xx discovered for blocksite.net (blocksite.net) added to firewall block list.
In this example, where a match becomes a block list firewall entry. The L4 Traffic Monitor matched an 
IP address to a domain name in the block list based on a DNS request which passed through the 
appliance. The IP address is then entered into the block list for the firewall.
Example 2
172.xx.xx.xx discovered for www.allowsite.com (www.allowsite.com) added to firewall allow 
list.
In this example, a match becomes an allow list firewall entry. The L4 Traffic Monitor matched a domain 
name entry and added it to the appliance allow list. The IP address is then entered into the allow list for 
the firewall.
Example 3
Firewall noted data from 172.xx.xx.xx to 209.xx.xx.xx (allowsite.net):80.
In this example, the L4 Traffic Monitor logs a record of data that passed between an internal IP address 
and an external IP address which is on the block list. Also, the L4 Traffic Monitor is set to monitor, not 
block.
19 Dialer
20 Hijacker
21 Phishing 
URL
22 Trojan 
Downloader
23 Trojan 
Horse
24 Trojan 
Phisher
25 Worm
26 Encrypted 
File
27 Virus
33 Other 
Malware
34 PUA
35 Aborted
36 Outbreak 
Heuristics
Table 25-13
Malware Scanning Verdict Values (continued)
Malware Scanning Verdict Value 
Malware Category