Audit Recording in High Availability Configurations10
Modifying and Supplementing Configuration Auditing11
SNMP Trap Control11
E-CLI Commands11
Auditing Record Storage and Persistence11
Managing the Audit Logs Table12
Viewing Auditing Logs12
Manually Emailing Auditing Logs12
Exporting Auditing Logs13
Refreshing the Auditing Logs13
Displaying the Auditing Logs on the console13
Auditing All Parameters During Addition14
SonicWall Support15
About This Document16
SonicOS/X 7 Monitor Logs Administration Guide
Contents
2
System Logs
NOTE: References to SonicOS/X indicate that the functionality is available in both SonicOS and
SonicOSX.
The SonicWall network security appliance maintains an Event log for tracking potential security threats.
Topics:
l Viewing System Logs
l System Log Functions
l Display Options
l Filtering the View
1
Viewing System Logs
To view system events, navigate to Monitor > Logs > System Logs page.
For a description of the:
l Functions, see System Log Functions
l Columns, see Display Options
SonicOS/X 7 Monitor Logs Administration Guide
System Logs
3
System Log Functions
The System Log table provides numerous settings to allow you to navigate, view, and export results. Table
columns can be customized, so that you can view full data on any event, or only the data you need. Table
entries can be sorted to display in either ascending or descending order.
To sort the entries in the Event Log, click the column heading. The entries are sorted by ascending or
descending order. The arrow to the right of the column name indicates the sorting status. A down arrow
means ascending order. An up arrow indicates a descending order.
The top row of the Event Log contains various functions. Functions pertaining only to Event Logs are
described in the below table.
SYSTEM EVENT LOG FUNCTIONS
OptionFunctionAction
SearchThe Event Log displays the log entries that
match the search string.
ShowSelect the interval for the Event Log. The
event logs from that period are displayed:
l Last 60 seconds
l Last 2 minutes
l Last 5 minutes (default)
l Last 10 minutes
l Last 15 minutes
l Last 30 minutes
l Last 60 minutes
l Last 3 hours
l Last 6 hours
l Last 12 hours
l Last 24 hours
l Last 7 days
l Last 15 days
l Last 30 days
l All entries
RefreshClick to refresh the system log data.
Configure LogClick this link and you are navigated to
Device > Log > Settings to configure the
items which needs to be tracked in the Event
Log.
Clear LogsClick to clear the logs from the table.
ExportClick to export the logs in CSV, TXT files,
and email
SonicOS/X 7 Monitor Logs Administration Guide
System Logs
4
Display Options
Customize the Events log to display as many or few columns that meet your needs.
To select which columns to display:
1.
Navigate to Monitor > Logs > System Logs.
2.
ClickGrid Settings icon . The Grid Settings dialog displays:
3.
Select the items you want to appear as columns in the System Log.
GeneralGeneral information about the log event.
TimeLocal date and time the event occurred.
IMPORTANT: This option is selected
by default. It is dimmed, and cannot be
deselected.
IDIdentifying number for the event.
IMPORTANT: This option is selected
by default. It is dimmed, and cannot be
deselected.
CategoryCategory of the event. This option is
selected by default.
GroupGroup designation of the event.
EventName of the event.
Msg TypeType of message; usually Standard
Message String.
PriorityPriority level of the event, such as Inform
(information) or Error.
IMPORTANT: This option is selected
by default.
MessageInformation about the event.
SonicOS/X 7 Monitor Logs Administration Guide
System Logs
5
InterfaceInformation about the protocol of the packet triggering the event.
SourceName of the source device, if applicable.
This option is selected by default.
Source IPIP address of the source device.
Source PortPort number of the source.
Source InterfaceSource network and IP address, if
applicable.
DestinationName of the destination device, if
applicable. This option is selected by
default.
Destination IPIP address of the destination device.
Destination PortPort number of the destination.
Destination InterfaceDestination network and IP address, if
applicable.
ProtocolInformation about the NAT policy in effect, if any.
Source NameProtocol source name.
Source NAT IPSource address from the Source NAT IP
address pool.
Source NAT PortPort number for the Source NAT.
In SPIIndicates whether the ingress packet is in
Stateful Packet Inspection (SPI) mode, if
applicable.
Destination NameProtocol destination name.
Destination NAT IPDestination address from the Source NAT
IP address pool.
Destination NAT PortPort number for the Destination NAT.
Out SPIIndicates whether the egress packet is in
Stateful Packet Inspection (SPI) mode, if
applicable.
IP ProtocolProtocol used to send error and control
messages, if known. This option is selected
by default.
ICMP TypeICMP packet’s ICMP type, if known.
ICMP CodeICMP packet’s ICMP code, if known.
SonicOS/X 7 Monitor Logs Administration Guide
System Logs
6
ConnectionInformation about SPI, Access and IDP Rules, and policies, if any.
TX BytesNumber of bytes transmitted.
RX BytesNumber of bytes received.
Access RuleName of the Access Rule triggering the
event, if any.
NAT PolicyName of the NAT policy.
VPN PolicyName of the VPN policy triggering the
event, if any.
User NameName of the user whose action triggered
the event.
Session TimeDuration of the session before the event.
Session TypeType of session triggering the event.
IDP RuleName of the IDP Rule triggering the event,
if any.
IDP PriorityPriority of the IDP Rule.
ApplicationInformation about the application being used.
HTTP OPNPCS object op requestMethod HTTP OP
code.
URLURL of the NPCS object op requestMethod
HTTP OP code.
HTTP ResultHTTP result code (such as, 200, 403) of
Website hit rpkt cn1Label Packet received.
Block CategoryBlock category that triggered the event.
ApplicationThe application being used.
OthersInformation about the user, session, and application, if known.
FW ActionConfigured firewall action. If no action has
been specified, displays N/A.
NotesIncludes notes. This option is selected by
default.
OperationActionProvides option to disable the events.
4.
When done, click Apply to preserve any changes or click Restore Default to revert back to the
default settings.
You can perform the following actions on the System Logs page:
l To export the logs in CSV, TXT files, and email, click Export icon and select the required format
l To clear the logs from the table, click Clear Logs icon
l To refresh the page, click Refresh icon
l To view more details of the log, click the triangle icon of the log
SonicOS/X 7 Monitor Logs Administration Guide
7
System Logs
Filtering the View
The Filter View input field at the top left corner of the System Log enables you to narrow your search using
drop-down options and search strings.
To filter the System Event logs:
1.
Navigate to Monitor > Logs > System Logs.
2.
Click Filter icon.
3.
Select any filtering scheme you want. Filter on just one field or you can filter on all of them. In the
General, Source and Destination fields, you can enter a partial string to filter on.
4.
Click Accept.
OR
Click Reset to clear the filters applied.
SonicOS/X 7 Monitor Logs Administration Guide
System Logs
8
2
Auditing Logs
This section describes in detail the recording feature that collects and records information on any changes in
the security appliance configuration. To access this feature, navigate to Monitor > Logs > Auditing Logs
in the SonicOS/X web management interface.
What is Configuration Auditing
Configuration auditing is a feature that automatically records any configuration changes that an
administrator attempts from one of the available user interfaces, web management (via HTTP and HTTPS),
command line (via console or SSH), or SonicWall GMS. A configuration auditing records table is created to
record all attempted configuration changes, both successful and failed. With configuration auditing,
SonicOS/X archives the history of its configuration changes, so that the administrator or others can later
revisit and analyze the records. This feature is enabled by default for the platforms where it is available.
Benefits of Configuration Auditing
Auditing of configuration change records can be useful as described below:
l Automatic documentation of any configuration changes performed by an administrator
l Assistance in troubleshooting unexpected changes in run-time system behavior
l Visibility, continuity, and consistency where there are several administrators, either simultaneously or
consecutively. Each administrator has access to a record of changes performed or attempted by all
other administrators.
l Third party integration with Firewall Manager, SEIM systems, logging and reporting solutions
l Compliance with regulations such as SOX, FISMA, NIST, DISA STIP
SonicOS/X 7 Monitor Logs Administration Guide
Auditing Logs
9
What Information is Recorded
Configuration auditing generates a record for every configuration change. The record includes:
l Which parameter was changed
l When the change was made
l Who made the change
l From where the change was made
l Details of the change, such as the previous and subsequent values
What Information is Not Recorded
The following are not included in the Configuration Auditing operation:
l Importing a Settings File - Configuration changes due to importing a settings file are currently not
recorded by the configuration auditing feature. Since all current settings are cleared prior to applying
imported configurations, the assumption is that all existing configurations are modified.
l WXA configuration settings — SonicOS/X does not audit any configuration changes in WAN
Acceleration. Some settings are saved on the WXA instead of the firewall, although the settings can
be configured from the SonicOS/X web management interface.
l ZEBOS settings for BGP/OSPF/RIP routing configurations — SonicOS/X stores these settings as
one long string of ZEBOS CLI commands. Records of changes made by these commands are not
duplicated in the configuration auditing operation.
l Anti-Spam Junk Store applications — Configuration settings changed through a proxy server running
a junk store are excluded from configuration auditing.
l Licensing - All aspects of system licensing are authenticated through MySonicWall, and are not
recorded through configuration auditing.
l Uploading a file from Home > Capture ATP does not audit uploading a file from the page, because
the contents of this page do not reside on the firewall.
Audit Recording in High Availability
Configurations
The Configuration Auditing operation records changes individually for each device. It does not synchronize
the recorded information between appliances in an HA pair. When the active HA unit next synchronizes with
the standby HA unit, it sends configuration changes to the standby unit. The synchronization operation
information updates the auditing record of the standby device in the pair. On the standby unit, the auditing
record indicates that the configuration changes it recorded came from the active unit.
SonicOS/X 7 Monitor Logs Administration Guide
Auditing Logs
10
Modifying and Supplementing Configuration
Auditing
Configuration Auditing operations can be modified and supplemented through the following:
SNMP Trap Control
SNMP (Simple Network Management Protocol) is an Internet Standard protocol for collecting and organizing
information about managed devices on IP networks. SNMP traps allow the user to monitor security
appliance status and configuration through a Management Information Database (MIB). Configuration
auditing works in conjunction with SNMP by giving the user the option to enable a trap for each logged event
collected during a network configuration change, whether successful or failed.
E-CLI Commands
E-CLI (Enterprise Command Line Interface) commands are available for configuration auditing record
setting and display, for those administrators who like to work from the command line. You can use the
following E-CLI commands to enable or disable configuration auditing and to view records:
to work with settings:
config(C0EAE49CE84C)# log audit settings
(config-audit)# enable
(config-audit)# debug
(config-audit)# auditall
(config-audit)# commit
to show audit records:
(config-audit)# show log audit view
Auditing Record Storage and Persistence
Configuration auditing records are saved to non-volatile storage (such as flash), so that records can be
restored, if required, after a reboot. The number of records saved is directly proportional to the capability of
the device, as defined in the product matrix below. Higher-end platforms can store more records than lowerend devices. Devices with no flash or smaller flash capacity do not support configuration auditing.
All configuration auditing records, on any platform, are deleted when the appliance is rebooted with factory
defaults.
SonicOS/X 7 Monitor Logs Administration Guide
Auditing Logs
11
Managing the Audit Logs Table
The administrator can manage the auditing records in many useful ways. The following activities are
available:
Topics:
l Viewing Auditing Logs
l Manually Emailing Auditing Logs
l Exporting Auditing Logs
l Refreshing the Auditing Logs
l Displaying the Auditing Logs on the console
l Auditing All Parameters During Addition
Viewing Auditing Logs
The Monitor > Logs > Auditing Logs page displays all the configuration auditing records. It allows a user
to view, search, and sort the records.
l The first column is expandable to display the summary of the log entry.
l There are also buttons for Select all Columns and Restore Default for ease of operation. Click
Grid Settings icon to perform the desired action.
l The user can search for a specific string pattern and highlight the matched results, if any are found.
l Failed configuration changes are marked in red.
l All columns are sortable.
Manually Emailing Auditing Logs
When a valid mail server and email address are configured, the user can click the email button on the tool
bar of the Auditing Records page to manually email auditing records at any time. The button is disabled if
either the mail server or the email address is not configured under Device > Log > Automation.
SonicOS/X 7 Monitor Logs Administration Guide
Auditing Logs
12
The Device > Log > Automation page includes settings for configuring the SonicWall to send log files
using Email and configuring mail server settings.
Exporting Auditing Logs
There are two export options for auditing records. You can export the records as a text file or as a CSV file.
Refreshing the Auditing Logs
The Refresh button provides a way to refresh the page and display the latest auditing records, as seen
below:
Displaying the Auditing Logs on the console
Click Supplemental > Display Auditing Records on Console option to display the auditing records on
the console in a text format.
SonicOS/X 7 Monitor Logs Administration Guide
Auditing Logs
13
Auditing All Parameters During Addition
By default, configuration auditing only logs significant changes, defined as changes where the new value of
the parameter is different from the default value. Click Supplemental > Audit Supplemental ParameterChanges option to record all parameter changes during an addition activity, even when the new values are
the same as the default values.
SonicOS/X 7 Monitor Logs Administration Guide
Auditing Logs
14
SonicWall Support
Technical support is available to customers who have purchased SonicWall products with a valid
maintenance contract.
The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24
hours a day, 365 days a year. To access the Support Portal, go to https://www.sonicwall.com/support.
The Support Portal enables you to:
l View knowledge base articles and technical documentation
l View and participate in the Community forum discussions at