01.01.2013 Views

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

Web Gateway 7.1.5 Product Guide - McAfee

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

8<br />

Monitoring<br />

Error handling<br />

Incidents can be used by rules to trigger a particular method of error handling, such as sending a<br />

notification message or creating an entry in the system log. To enable the use of incidents in rules, key<br />

incident parameters, including the ID, severity, origin, and others, are made available as properties.<br />

For example, there is the Incident.ID property. A rule can use this property to trigger an event that<br />

creates a syslog entry if the value of the property is a particular number.<br />

Rules using incidents<br />

The Default rule set for error handling contains a nested rule set providing rules that trigger a<br />

notification message and other error handling events when incidents concerning the Log File Manager<br />

occur. The name of this nested rule set is Log File Manager Incidents. Other nested rule sets handle<br />

incidents related to updates and licensing.<br />

You can also create rules and rules sets of your own that use incidents for error handling.<br />

For more information on incident use in a default rule set, see Log File Manager Incidents.<br />

Incident parameters and properties<br />

Incidents are recorded on the appliance with their IDs and other parameters. For each parameter, there<br />

is a property, which can be used in an appropriate rule.<br />

• Incident ID — Each incident is identified by a number. For example, the incident with ID 501 is a<br />

failure of the Log File Manager to push log files. The Incident.ID property can be used in a rule to<br />

check the ID of an incident.<br />

• Description — An incident can be explained by a description in plain text. The name of the relevant<br />

property is Incident.Description.<br />

• Origin — Each incident is assigned to the appliance component that is its origin. Origins are specified<br />

by numbers. For example, origin number 5 specifies the Log File Handler. The name of the relevant<br />

property is Incident.Origin.<br />

The origin of an incident is further specified by the value of the Incident.OriginName property.<br />

• OriginName — The origin of an incident is further specified by the name of the appliance component<br />

that is involved in the incident. The name of the relevant property is Incident.OriginName.<br />

The origin name can specify a subcomponent that is a part of the component specified by the<br />

origin number. For example, origin number 2 (Core) can be further specified by the origin name<br />

as:<br />

• Core<br />

• Proxy<br />

• URL Filter<br />

• and other names of core subcomponents<br />

• Severity — Each incident is classified according to its severity. Severity levels range from 0 to 7, with<br />

0 indicating the highest level.<br />

Note: These levels are the same as those used for entries in a syslog file.<br />

The name of the relevant property is Incident.Severity.<br />

• Affected host — If there is an external system that is involved into an incident, for example, a server<br />

that the appliance cannot connect to, the IP address of this system is also recorded. The name of the<br />

relevant property is Incident.AffectedHost.<br />

For more information on the properties that are available for use in incident handling rules, see List of<br />

properties. For individual incident IDs, see List of incident IDs.<br />

306 <strong>McAfee</strong> <strong>Web</strong> <strong>Gateway</strong> <strong>7.1.5</strong> <strong>Product</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!