15Logging menu

Logging refers to the recording of event messages, e.g., regarding settings that have been made, the application of firewall rules, errors, etc.

Log entries are recorded in various categories and can be sorted and displayed according to these categories (see “Logging >> Browse Local Logs” on page 411).

15.1Logging >> Settings

15.1.1Settings

Logging_Einstellungen_Einstellungen.png

All log entries are recorded in the RAM of the mGuard by default. Once the maximum mem­ory space for log entries has been used up, the oldest log entries are automatically overwrit­ten by new entries. In addition, all log entries are deleted when the mGuard is switched off.

To prevent this, log entries can be transmitted to an external computer (remote server). This is particularly useful if you wish to manage the logs of multiple mGuard devices centrally.

Logging >> Settings

Remote Logging

Activate remote UDP logging

If you want all log entries to be transmitted to the external log server (specified below), activate the function.

 

Log server IP address

Specify the IP address of the log server to which the log entries should be transmitted via UDP.

An IP address must be specified, not a host name. This func­tion does not support name resolution because it might not be possible to make log entries if a DNS server fails.

 

Log server port

Specify the port of the log server to which the log entries should be transmitted via UDP. Default: 514

 

Section1500638.jpg

 

 

If the IPsec VPN >> Connections >> Edit >> General, Local option is set to 1:1 NAT (see page 336), the following applies:

The internal IP address must be located in the specified local network.

If the IPsec VPN >> Connections >> Edit >> General, Remote option is set to 1:1 NAT (see page 338), the following applies:

The IP address of the remote log server must be located in the network that is speci­fied as Remote in the definition of the VPN connection.

Verbose logging

Verbose modem log­ging

Only available if an internal or external modem is available and switched on.

Internal modem: TC MGUARD RS4000/RS2000 3G, TC MGUARD RS4000/RS2000 4G, FL MGUARD RS with internal analog modem or ISDN modem

External modem: FL MGUARD RS4000/RS2000, TC MGUARD RS4000/RS2000 3G, TC MGUARD RS4000/RS2000 4G, FL MGUARD RS4004/RS2005, mGuard Centerport (Innominate), FL MGUARD CENTERPORT, FL MGUARD RS, FL MGUARD BLADE, mGuard delta (Innominate), FL MGUARD DELTA

Verbose logging

 

Verbose mobile net­work logging

Only available with the TC MGUARD RS4000/RS2000 3G, TC MGUARD RS4000/RS2000 4G

Verbose logging

15.2Logging >> Browse Local Logs

Logging_Logs-ansehen.png

The corresponding check boxes for filtering entries according to their category are dis­played below the log entries, depending on which mGuard functions were active.

To display one or more categories, enable the check boxes for the desired categories. The log entries are continuously updated according to the selection.

To pause or continue the continuous updating of the log entries, click on the  Pause_Button.png Pause or Play_Button.png Continue button.

Access to log entries

The log entries can be accessed in various ways

Table 15-1: Viewing log entries

mGuard

UDP

Web interface (web UI)

/var/log/cifsscand

socklog

CIFS Integrity Checking

/var/log/dhclient

No

Common

/var/log/dhcp-ext

No

DHCP Server/Relay

/var/log/dhcp-int

No

DHCP Server/Relay

/var/log/dnscache

No

No

/var/log/dynrouting

socklog

Dynamic Routing

/var/log/firestarter

svlogd

IPsec VPN

/var/log/firewall

svlogd

Network Security

/var/log/fwrulesetd

socklog

Network Security

/var/log/gsm

No

Common

/var/log/https

No

No

/var/log/ipsec

socklog

IPsec VPN

/var/log/l2tp

No

IPsec VPN

/var/log/lldpd

No

SNMP/LLDP

/var/log/login

No

No

/var/log/maid

No

No

/var/log/main

socklog

Common

/var/log/maitrigger

No

No

/var/log/openvpn

socklog

OpenVPN Client

/var/log/pluto

svlogd

IPsec VPN

/var/log/psm-sanitize

No

Common

/var/log/pullconfig

socklog

Common

/var/log/redundancy

socklog

Common

/var/log/snmp

No

SNMP/LLDP

/var/log/tinydns

No

Common

/var/log/userfwd

socklog

Network Security

.

15.2.1Log entry categories

Logging >> Browse Local Logs >> Categories

General

Log entries that cannot be assigned to other categories.

Network Security

Logged events are shown here if the logging of events was selected when defining the firewall rules (Log = enabled).

Log ID and number for tracing errors

Log entries that relate to the firewall rules listed below have a log ID and number. This log ID and number can be used to trace the firewall rule to which the corresponding log entry relates and that led to the corresponding event.

Firewall rules and their log ID

Packet filters:

Network Security >> Packet Filter >> Incoming Rules menu

Network Security >> Packet Filter >> Outgoing Rules menu

Log ID: fw-incoming or fw-outgoing

Firewall rules for VPN connections:

IPsec VPN >> Connections >> Edit >> Firewall menu, Incoming/Outgoing

Log ID: fw-vpn-in or fw-vpn-out

 

Firewall rules for OpenVPN connections:

OpenVPN Client >> Connections >> Edit >> Firewall menu, Incoming/Outgoing

Log ID: fw-openvpn-in or fw-openvpn-out

OpenVPN Client >> Connections >> Edit >> NAT menu

Log ID: fw-openvpn-portfw 

Firewall rules for web access to the mGuard via HTTPS:

Management >> Web Settings >> Access menu

Log ID: fw-https-access

 

Firewall rules for access to the mGuard via SNMP:

Management >> SNMP >> Query menu

Log ID: fw-snmp-access

Firewall rules for SSH remote access to the mGuard:

Management >> System Settings >> Shell Access menu

Log ID: fw-ssh-access

Firewall rules for access to the mGuard via NTP:

Management >> System Settings >> Time and Date menu

Log ID: fw-ntp-access

 

Firewall rules for the user firewall:

Network Security >> User Firewall menu, Firewall Rules

Log ID: ufw-

Rules for NAT, port forwarding:

Network >> NAT >> IP and Port Forwarding menu

Log ID: fw-portforwarding

 

Firewall rules for the serial interface:

Network >> Interfaces >> Dial-in menu

Incoming rules: log ID: fw-serial-incoming

Outgoing rules: log ID: fw-serial-outgoing

 

Searching for firewall rules based on a network security log

As of mGuard firmware version 8.6.0, firewall log entries in the list are highlighted in blue and provided with a hyperlink. A click on the firewall log entry, e. g. fw-https-access-1-1ec2c133-dca1-1231-bfa5-000cbe01010a opens the configuration page (menu >> sub­menu >> tab) with the firewall rule that caused the log entry.

When using mGuard firmware versions < 8.6.0, proceed as follows:

If the Network Security check box is enabled so that the relevant log entries are dis­played, the Jump to firewall rule search field is displayed below the Reload logs button.

Proceed as follows if you want to trace the firewall rule referenced by a log entry in the Net­work Security category and which resulted in the corresponding event:

Proceed as follows if you want to trace the firewall rule referenced by a log entry in the Net­work Security category and which resulted in the corresponding event:

1.Select the section that contains the log ID and number in the relevant log entry, for example: fw-https-access-1-1ec2c133-dca1-1231-bfa5-000cbe01010a

Logging_Logs-ansehen00640.png

2.Copy this section to the Jump to firewall rule field.

3.Click on the Lookup button.

The configuration page containing the firewall rule that the log entry refers to is displayed.

FL MGUARD BLADE

In addition to error messages, the following messages are output on the FL MGUARD BLADE controller:

(The areas enclosed by < and > are replaced by the relevant data in the log entries.)

General messages:

blade daemon "<version>" starting ...

Blade[<bladenr>] online

Blade[<bladenr>] is mute

Blade[<bladenr>] not running

Reading timestamp from blade[<bladenr>]

When activating a configuration profile on a blade:

Push configuration to blade[<bladenr>]

reconfiguration of blade[<bladenr>] returned <returncode>

blade[<bladenr>] # <text>

When retrieving a configuration profile from a blade:

Pull configuration from blade[<bladenr>]

Pull configuration from blade[<bladenr>] returned <returncode>

CIFS Integrity Checking

Messages relating to the integrity check of network drives are displayed in this log.

In addition, messages that occur when connecting the network drives and are required for the integrity check are also visible.

IPsec VPN

Lists all VPN events.

The format corresponds to standard Linux format.

There are special evaluation programs that present information from the logged data in a more easily readable format.

OpenVPN Client

Lists all OpenVPN events.

DHCP Server/Relay

Messages from the services that can be configured under Network >> DHCP.

 

SNMP/LLDP

Messages from the services that can be configured under Management >> SNMP.

Dynamic Routing

Lists all events that are generated by dynamic routing.