CacheGuard-OS
User's Guide - Version UF-2.2.1


Traffic Logging

The logging gives you visibility into allowed or denied traffic exchanged with or via a CacheGuard appliance. As an administrator, you have the possibility to select which type of traffic should be logged. You can refer to the log command description in the Commands Manual to learn more about available log types. Logs are stored locally on a CacheGuard appliance and can be saved on trusted remote file servers for inspection. You have also the possibility to send them in real time to remote log servers using the "syslog" protocol (based on UDP or TCP).

Managing Logs

An daily automatic log rotation during off-peak hours (between 04:00 AM and 06:59) backups logs for a period of n days where n is a value between 1 and 365 configured during the CacheGuard-OS installation. Each rotated log is identified by an integer between 1 and n called the log serial number. The most recent log (yesterday log) has the number 1 and oldest one has the number n. Note that in case where the appliance is overloaded, logs rotation occurs hourly in order to avoid to fill the provisioned log space on disks.

To save the current (today's) log, an explicit log rotation should be forced. The explicit log rotate allows you to do not have to wait for the daily automatic logs rotation. To rotate logs and have a report on the status of the log rotation, use the following commands:

Once the log rotation operation is finished, you can save the desired log types on a trusted file server. Note that saved logs are in a gzip compressed format. To save the most recent Web access log in a file named "web-access-log.gz" located on the TFTP server having the IP address 172.18.2.1, use the following command: Note that logs can be saved on trusted file servers only. To declare a file server as trusted use the access file command. The logging can also be completely disabled. To completely disable the logging, use the following commands:

Logging Web Accesses

All Web accesses in forwarding and reverse modes can be logged. The Web access logging allows you to observe all Web access in detail and know which machine accesses which URL at which time. To activate the Web access logging in forwarding and reverse modes, use the following commands:

Logging Denied Traffic

Allowed access logging concerns Web traffic only (in web or rweb modes). However, all rejected traffic (Web or non Web) by services running on a CacheGuard appliance can be logged. For instance, you have the possibility to configure the appliance to log all attempts to access forbidden URLs (denied by the URL guarding) and all rejected network traffic at the IP level (denied by the firewall). To this end, you must use the following commands:

Syslog Servers

You can optionally send all locally saved logs to remote log servers that support the syslog protocol (UDP or TCP). Prior to activate the logging of a traffic type on a remote syslog server, the remote syslog server must be allowed on a CacheGuard appliance. To configure the appliance to send in real time its URL guarding logs to the syslog server having the IP address 172.20.2.1 and configured to use UDP, use the following commands: More than a syslog server can be specified on a CacheGuard appliance. In this case, logs are send to all specified syslog servers in parallel.