Solved

Logs from sonicwall and zywal35

Posted on 2008-06-26
6
253 Views
Last Modified: 2010-04-12
hi guys

i need to get the logs of a sonicwall and a zywall35 for interpertation by an analyser program for monitoring web traffic of users how do i do it does anyone know of good monitoring programs that can be used to track web usage

thanks
0
Comment
Question by:ciandirrane
  • 3
  • 3
6 Comments
 
LVL 32

Expert Comment

by:dpk_wal
ID: 21880851
What is the format of the log files which you get, is it text logs or they are in some proprietory format .

There are two products from Kiwi which I use for my smaller SOHO units:
Kiwi syslog daemon (to log events as syslog) and kiwi log viewer; they not would give the capability to monitor and report web usage, however can help in searching logs and creating syslog if not already configured [http://www.kiwisyslog.com/].

Please advice.

Thank you.
0
 

Author Comment

by:ciandirrane
ID: 21882009
Hi
how do i use these products ?
0
 
LVL 32

Accepted Solution

by:
dpk_wal earned 500 total points
ID: 21882474
If sonicwall/zywal support syslog forwarding then you can install kiwi syslog daemon on a windows machine and configure the devices to send syslog information to the machine where syslog is running.

Then using the log viewer you would be able to view the logs.

Thank you.
0
Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

 

Author Comment

by:ciandirrane
ID: 22006111
Thanks
0
 

Author Comment

by:ciandirrane
ID: 22006114
thanks
0
 
LVL 32

Expert Comment

by:dpk_wal
ID: 22006438
You are welcome, happy I could help! :)
0

Featured Post

Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Worried about if Apple can protect your documents, photos, and everything else that gets stored in iCloud? Read on to find out what Apple really uses to make things secure.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question