Barracuda Web Filter User Guide

Understanding Syslog Messages
for the Barracuda Web Filter

Overview

This document describes each element of a syslog message so you can better analyze why your Barracuda Web Filter performs a particular action for each traffic request.
The Barracuda Web Filter uses syslog messages to log what happens to each traffic req uest performed by your users. The syslog messages are sent to a text file on the Barracuda Web Filter, as well as to a remote server specified by the Barracuda Web Filter administrator.
To enable syslog reporting on your Barracuda Web Filter, go to the Advanced > Syslog page in the admin interface, and enter the IP address of the syslog server that you want to direct messages to. If you are running syslog on a UNIX machine, be sure to start the syslog daemon process with the “-r” option so that it can receive messages from sources other than itself. Windows users will have to install a separate program to use syslog because the Windows OS does not include syslog capabilities. Kiwi Syslog is a popul ar solution, but many others are available that are both free and commercial.
Syslog messages are sent to the standard syslog UDP port 514. If there are any firewalls between the Barracuda Web Filter and the server receiving the syslog messages, be sure that port 514 is open on the firewalls. The syslog messages arrive on the mail facility at the debug priority level. As the Barracuda Web Filter uses the syslog messages internally for its own message logging, it is not possible to change the facility or the priority level. For more information about where the syslog messages will be placed, refer to the documentation of your syslog server.

Syslog Format

Each syslog message contains three types of information:
Section 1: Basic Information
Section 2: Transparent Proxy Information
Section 3: Policy Engine Information
This section identifies each element of the syslog using based on the following example:
Sep 19 17:07:07 Barracuda httpscan[3365]: 1158710827 1 10.1.1.8 172.27.72.27 text/html 10.1.1.8 http://www.sex.com/ 2704 3767734cc16059e52447ee498d31f822 ALLOWED CLEAN 2 1 0 1 3 - 1 adult 0 - 0 sex.com adult,porn ANON
Understanding the Syslog Messages 1

Syslog Examples

This section shows three syslog examples.

Example 1. Clean, policy-allowed traffic

The following example shows a syslog message for clean traffic going to an allowed Web site (CNN.com). The term “clean” represents traffic that does not contain viruses or spyware.
Sep 19 17:06:59 Barracuda httpscan[3365]: 1158710819 1 10.1.1.8 64.236.16.139 image/gif 10.1.1.8 http://i.cnn.net/cnn/.element/img/1.3/video/tab.middle.on.gif 1744 3767734cc16059e52447ee498d31f822 ALLOWED CLEAN 2 0 0 0 0 - 0 - 0 - 0 cnn.net news ANON

Example 2: Clean, policy-denied traffic

The following example shows “clean” traffic going to a Web site that is blocke d by one of the Barracuda Web Filter policies. In this example, the web site sex.com is blocked by the…
Sep 19 17:07:07 Barracuda httpscan[3365]: 1158710827 1 10.1.1.8 172.27.72.27 text/html 10.1.1.8 http://www.sex.com/ 2704 3767734cc16059e52447ee498d31f822 ALLOWED CLEAN 2 1 0 1 3 - 1 adult 0 - 0 sex.com adult,porn ANON
Understanding the Syslog Messages 2

Example 3: Virus-infected traffic blocked by the Barracuda Web Filter

The following example shows traffic that has been blocked by the Barracuda Web Filter because the traffic contains a known virus.
Sep 19 17:08:00 Barracuda httpscan[3365]: 1158710880 1 10.1.1.8 127.0.0.1 - 10.1.1.8 http://www.eicar.org/download/eicar.com.txt 0 3767734cc16059e52447ee498d31f822 BLOCKED VIRUS stream=>Eicar-Test-Signature FOUND 2 0 0 0 0 - 0 - 0 - 0 eicar.org computing-technology ANON

Detailed Description

The following table describe each element of a syslog message.
Field Name Example Description
Epoch Time 1158710827 Seconds since 1970, unix timestamp. Src IP 10.1.1.8 IP address of the client. Dest IP 172.27.72.27(72.32.54.242) IP address for the page that was blocked by the
Barracuda Web Filter. Content Type text/html HTTP header designated content type. Src IP 10.1.1.8 IP address of the client. Destination
URL Data Size 2704 The size of the content. MD5 anchor 37…22 The anchor used for parsing. This information is not
Action ALLOWED Action performed by the transparent proxy. The type of
http://www.sex.com The URL the client tried to visit.
usually important.
actions include:
ALLOWED: Traffic was processed by the transparent proxy and no virus or spyware was detected.
BLOCKED: Traffic was blocked by the transparent proxy most likely because the proxy detected virus or spyware.
DETECTED: Another process detected outbound spyware activity.
Reason CLEAN Reason for the action:
CLEAN: Traffic does not contain any virus or spyware.
VIRUS: Traffic was blocked because it contains a virus.
SPYWARE: Traffic was blocked because it contained spyware.
Details (only for
blocked traffic)
Stream=>Eicar-Test­Signature FOUND
The name of the virus or spyware that was detected in the blocked traffic.
Understanding the Syslog Messages 3
Field Name Example Description
Format Ver 2 The version of the policy engine output. The most current 3.0 firmware
uses policy engine version 2. Match flag 1 Whether an existing policy matched the traffic. 1=Yes and 0=No. TQ flag 0 Whether the rule is time-qualified. For Example, during work hours 9am -
5pm. 1=Yes and 0=No. Action Type 1 The action performed by the policy engine on this request:
0 : allowed
1 : denied
2 : redirected
3 : rewrote by add/set a new parameter in query
4 : rewrote by delete an existing parameter in query
5 : matched a rule and allowed but marked as monitored
6 : branched to another rule set. Src Type 3 If matched by source, what is its type:
0 : always, matches any source
1 : group, matched by group id
2 : ipv4addr, matched by an Ipv4 address
3 : login, matched by login
4 : login any, matched any authenticated user
5 : min_score, matched due to minimum infection threshold breached. Src Detail - Any detail related to the matched source. Dst Type 1 If matched by destination, what is its type?
0 : always, matched any destination
1 : category, matched a particular category
2 : category any, matched any category
3 : domain, matched due to domain or subdomain
4 : mimetype, matched due to mime-type
5 : spyware hit, matched due to spyware hit
6 : uri path regex, matched URI path
7 : uri regex, matched any part of the URI
8 : application, matches an application characterstics Dst Detail adult Detail of the matched destination. In this case it is the first matched
category, which is adult. Spy Type 0 If it is a spyware hit, what is its type:
0: allow
1: block
2: infection Spy ID - The name of the spyware if matched due to spyware hit. Infection
0 Weight of the infection. Currently, mostly 0.
Score Matched
sex.com The part of the rule that matched.
Part Matched
adult,porn The policy category that matched the traffic?
Category
Understanding the Syslog Messages 4
User Info ANON User information:
ANON: Anonymous, unauthenticated users
ldap: Username: LDAP user info
username: Non-LDAP user info (users created create in the admin
interface).
Understanding the Syslog Messages 5
Loading...