Cisco Cisco Web Security Appliance S190 사용자 가이드

다운로드
페이지 286
11-30
AsyncOS 9.2 for Cisco Web Security Appliances User Guide
 
Chapter 11      Monitor System Activity Through Logs
  Log File Fields and Tags
Example 1
172.xx.xx.xx discovered for blocksite.net (blocksite.net) added to firewall block list.
In this example, where a match becomes a block list firewall entry. The Layer-4 Traffic Monitor matched 
an IP address to a domain name in the block list based on a DNS request which passed through the 
appliance. The IP address is then entered into the block list for the firewall.
Example 2
172.xx.xx.xx discovered for www.allowsite.com (www.allowsite.com) added to firewall allow 
list.
In this example, a match becomes an allow list firewall entry. The Layer-4 Traffic Monitor matched a 
domain name entry and added it to the appliance allow list. The IP address is then entered into the allow 
list for the firewall.
Example 3
Firewall noted data from 172.xx.xx.xx to 209.xx.xx.xx (allowsite.net):80.
In this example, the Layer-4 Traffic Monitor logs a record of data that passed between an internal IP 
address and an external IP address which is on the block list. Also, the Layer-4 Traffic Monitor is set to 
monitor, not block.
Related Topics
 
Log File Fields and Tags
Access Log Format Specifiers and W3C Log File Fields
Log files use variables to represent the individual items of information that make up each log file entry. 
These variables are called format specifiers in Access logs and log fields in W3C logs and each format 
specifier has a corresponding log field.
To configure Access Logs to display these values, see 
 and 
information about custom fields in