Netgear UTM5 User Manual Page 457

  • Download
  • Add to my manuals
  • Print
  • Page
    / 484
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 456
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
System Logs and Error Messages C-13
v1.0, January 2010
Spam Logs
This section describes logs that are generated when the UTM filters spam e-mail messages.
Message 2009-08-01 00:00:01 HTTP 192.168.1.3 192.168.35.165
http://192.168.35.165/testcases/files/virus/normal/%b4%f3%d3%da2048.rar
Proxy Block
Explanation Logs that are generated when Web content is blocked because it uses a proxy.
The message shows the date and time, protocol, client IP address, server IP
address, URL, reason for the action, and action that is taken.
Recommended Action None
Message 2009-08-01 00:00:01 HTTP 192.168.1.3 192.168.35.165
http://192.168.35.165/testcases/files/virus/normal/%b4%f3%d3%da2048.rar
Keyword Block
Explanation Logs that are generated when Web content is blocked because it violates a
blocked keyword. The message shows the date and time, protocol, client IP
address, server IP address, URL, reason for the action, and action that is
taken.
Recommended Action None
Table C-19. Content Filtering and Security Logs: Spam
Message 2009-02-28 23:59:59 SMTP 192.168.1.2 192.168.35.165
[email protected] [email protected] Blocked by customized blacklist. 0
RBL Block
Explanation Logs that are generated when spam messages are blocked by the RBL. The
message shows the date and time, protocol, client IP address, server IP
address, sender, recipient, subject line, mechanism that detected the spam,
and action that is taken.
Recommended Action None
Message 2009-02-28 23:59:59 SMTP 192.168.1.2 192.168.35.165
[email protected] [email protected] Blocked by customized blacklist. 0
Heuristic Block
Explanation Logs that are generated when spam messages are blocked by Distributed
Spam Analysis. The message shows the date and time, protocol, client IP
address, server IP address, sender, recipient, subject line, mechanism that
detected the spam, and action that is taken.
Recommended Action None
Table C-18. Content Filtering and Security Logs: Web Filtering and Content Filtering
Page view 456
1 2 ... 452 453 454 455 456 457 458 459 460 461 462 ... 483 484

Comments to this Manuals

No comments