18.07.2013 Views

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.1 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Logging<br />

application<br />

messages using<br />

Syslog<br />

Table 18-3. Audit data field examples<br />

Name Type Description<br />

Logging application messages using Syslog<br />

srcip 32 bit_integer source IP address<br />

dstip 32 bit_integer destination IP address<br />

srcport 16 bit_integer source port number<br />

srcservice string source service name (/etc/services)<br />

dstport 16 bit_integer destination port number<br />

dstservice string destination service name<br />

(/etc/services)<br />

srcburb 32 bit_integer source burb number<br />

dstburb 32 bit_integer destination burb number<br />

bytes_written<br />

_to_client<br />

bytes_written<br />

_to_server<br />

64 bit_integer number <strong>of</strong> bytes sent to a client<br />

64 bit_integer number <strong>of</strong> bytes sent to a server<br />

netsessid 64 bit_integer a network traffic session ID<br />

srchostname string source host name<br />

dsthostname string destination host name<br />

The <strong>Sidewinder</strong> <strong>G2</strong> uses the UNIX syslog facility to log messages<br />

sent by programs running on the system. These messages can be<br />

useful in tracking down unauthorized system users or in analyzing<br />

hardware or s<strong>of</strong>tware problems. All syslog data is stored in the<br />

<strong>Sidewinder</strong> <strong>G2</strong>’s audit log files.<br />

Logging is set up to be handled automatically on the <strong>Sidewinder</strong> <strong>G2</strong>.<br />

As an administrator, you will not need to intervene unless you want to<br />

change options, such as where log files are stored. Listed below are<br />

some basic points about syslog and how it works on the <strong>Sidewinder</strong><br />

<strong>G2</strong>.<br />

Note: Secure Computing recommends that you edit these files only if you are an<br />

experienced UNIX administrator.<br />

Monitoring, Auditing, and Reporting 18-21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!