11Logging menu

Logging refers to the recording of event messages, e.g., regarding settings that have been made, the application of firewall rules, errors, etc.

Log entries are recorded in various categories and can be sorted and displayed according to these categories (see “Logging >> Browse Local Logs” on page 328).

11.1Logging >> Settings

11.1.1Settings

Logging_Einstellungen_Einstellungen.png

All log entries are recorded in the RAM of the mGuard by default. Once the maximum memory space for log entries has been used up, the oldest log entries are automatically overwritten by new entries. In addition, all log entries are deleted when the mGuard is switched off.

To prevent this, log entries can be transmitted to an external computer (remote server). This is particularly useful if you wish to manage the logs of multiple mGuard devices cen­trally.

Logging >> Settings

Remote Logging

The log entries can be transferred to an external log server (syslog server) using the re­mote logging function.

To check on the external log server whether log entries are transmitted regularly, an "UPTIME" log entry is created approximately every 30 minutes and sent to the syslog server. The log entry shows the current uptime of the mGuard device.

Example: 2024-12-25_08:20:00.90770 uptime-audit: -------- UPTIME: 29 min --------

 

Activate remote UDP logging

If you want all log entries to be transmitted to the external log server (specified below), activate the function.

 

 

Log server IP address

Specify the IP address of the log server to which the log en­tries should be transmitted via UDP.

An IP address must be specified, not a host name. This func­tion does not support name resolution because it might not be possible to make log entries if a DNS server fails.

 

Log server port

Specify the port of the log server to which the log entries should be transmitted via UDP. Default: 514

 

Section1500564.jpg

 

 

If the “IPsec VPN >> Connections >> Edit >> General”, Local option is set to 1:1 NAT (see page 266), the following applies:

The internal IP address must be located in the specified local network.

If the “IPsec VPN >> Connections >> Edit >> General”, Remote option is set to 1:1 NAT (see page 268), the following applies:

The IP address of the remote log server must be located in the network that is specified as Remote in the definition of the VPN connection.

Data Protection

Log entries may contain personal data. In order to comply with basic data protection re­quirements, it is possible to store log entries on the device only for a limited period of time. After a configurable retention period has expired, log entries are automatically deleted from the device.

inset_20.jpgLog entries that are also transferred to an external log server (syslog server) are only deleted locally on the device after the storage period has expired. Data protection-compliant storage of the transferred log entries must therefore also be ensured on the external log server.

 

Maximum retention period for log entries (0 = unlimited)

Default: 0 (no limit)

Specifies the maximum number of days after which a lo­cally stored log entry is deleted on the device.

The value 0 (default setting) means that there is no maxi­mum retention period for the deletion of log entries.

Section1500567.jpg
Section1500569.jpg

 

Maximum retention period: 365 days

11.2Logging >> Browse Local Logs

Logging_Logs-ansehen.png

mGuard devices have different functions depending on the model. Depending on the available functions, the log entries can be filtered by category so that only the intended log entries are visible in the WBM.

To display one or more categories, enable the check boxes for the desired categories. The log entries are continuously updated according to the selection.

To pause or continue the continuous updating of the log entries, click on the  Pause_Button.png Pause or Play_Button.png Continue button.

Access to log entries

The log entries can be accessed in various ways

Table 11-1 Viewing log entries

mGuard

UDP

Web interface (web UI)

/var/log/dhclient

No

Common

/var/log/dhcp-ext

No

DHCP Server/Relay

/var/log/dhcp-int

No

DHCP Server/Relay

/var/log/dhcp-dmz

No

DHCP Server/Relay

/var/log/dnscache

No

No

/var/log/dynrouting

socklog

Dynamic Routing

/var/log/firestarter

svlogd

IPsec VPN

/var/log/firewall

svlogd

Network Security

/var/log/fwrulesetd

socklog

Network Security

/var/log/https

No

No

/var/log/ipsec

socklog

IPsec VPN

/var/log/l2tp

No

IPsec VPN

/var/log/lldpd

No

SNMP/LLDP

/var/log/maid

No

Common

/var/log/main

socklog

Common

/var/log/maitrigger

No

No

/var/log/openvpn

socklog

OpenVPN Client

/var/log/pluto

svlogd

IPsec VPN

/var/log/psm-sanitize

No

Common

/var/log/pullconfig

socklog

Common

/var/log/redundancy

socklog

Common

/var/log/snmp

No

SNMP/LLDP

/var/log/tinydns

No

Common

/var/log/userfwd

socklog

Network Security

.

11.2.1Log entry categories

Logging >> Browse Local Logs >> Categories

General

Log entries that cannot be assigned to other categories.

Examples (without time stamp):

HTTPS (Login/Logout)

Webinterface: Failed login for '*******' role '*******' from 192.168.1.55 by Web

Webinterface: Accepted login for 'user1' role 'admin' from 192.168.1.55 by Web

Webinterface: Logout for 'user1' role 'admin' from 192.168.1.55 by timeout

SSH (Login)

sshd[28296]: Accepted password for admin from 192.168.1.55 port 49248 ssh2

inno-sshlimitd: accepting new connection at fd 6

inno-sshlimitd: allow session 1 of maximum 4 for role admin (class 1) at fd 6

ssh[28472]: session start for user 'admin'

Action

maid[12138]: User 'user1' performed a configuration change with role 'admin':

maid[12138]: NTP_ENABLE set to 'no'

Network Security / Firewall

Logged events are shown here if the logging of events was selected when defining the firewall rules (Log = enabled).

Log ID and number for tracing errors

Log entries that relate to the firewall rules listed below have a log ID and number. This log ID and number can be used to trace the firewall rule to which the corresponding log entry relates and that led to the corresponding event.

Firewall rules and their log ID

Packet filters:

“Network Security >> Packet Filter >> Incoming Rules” menu

“Network Security >> Packet Filter >> Outgoing Rules” menu

Log ID: fw-incoming or fw-outgoing

Firewall rules for VPN connections:

“IPsec VPN >> Connections >> Edit >> Firewall” menu, Incoming/Outgoing

Log ID: fw-vpn-in or fw-vpn-out

Firewall rules for OpenVPN connections:

“OpenVPN Client >> Connections >> Edit >> Firewall” menu, Incoming/Outgoing

Log ID: fw-openvpn-in or fw-openvpn-out

“OpenVPN Client >> Connections >> Edit >> NAT” menu

Log ID: fw-openvpn-portfw

 

Firewall rules for web access to the mGuard via HTTPS:

“Management >> Web Settings >> Access” menu

Log ID: fw-https-access

 

Firewall rules for access to the mGuard via SNMP:

“Management >> SNMP >> Query” menu

Log ID: fw-snmp-access

Firewall rules for SSH remote access to the mGuard:

“Management >> System Settings >> Shell Access” menu

Log ID: fw-ssh-access

Firewall rules for access to the mGuard via NTP:

“Management >> System Settings >> Time and Date” menu

Log ID: fw-ntp-access

 

Firewall rules for the user firewall:

“Network Security >> User Firewall” menu, Firewall Rules

Log ID: ufw-

Rules for NAT, port forwarding:

“Network >> NAT >> IP and Port Forwarding” menu

Log ID: fw-portforwarding

 

 

Searching for firewall rules based on a network security log

As of mGuard firmware version 8.6.0, firewall log entries in the list are highlighted in blue and provided with a hyperlink. A click on the firewall log entry, e. g. fw-https-ac­cess-1-1ec2c133-dca1-1231-bfa5-000cbe01010a opens the configuration page (menu >> submenu >> tab) with the firewall rule that caused the log entry.

IPsec VPN

Lists all VPN events.

The format corresponds to standard Linux format.

There are special evaluation programs that present information from the logged data in a more easily readable format.

OpenVPN

Lists all OpenVPN events.

DHCP Server/Relay

Messages fraom the services that can be configured under “Network >> DHCP”.

 

SNMP/LLDP

Messages from the services that can be configured under “Management >> SNMP”.