Solved

What options are available for reporting and logging in a Sonicwall TZ 170 Enhanced?

Posted on 2009-07-07
9
408 Views
Last Modified: 2012-05-07
Specifically I would like to know where I can go in the configuration and get a log of website useage by ip address. I was asked by management if there was a way to track website usage I know it can be done I just don't know where to look.

Thank you in advance for your help
0
Comment
Question by:kallatech
  • 5
  • 4
9 Comments
 
LVL 32

Expert Comment

by:nappy_d
ID: 24795470
0
 

Author Comment

by:kallatech
ID: 24796664
I don't want to use a product I want to use what is available in the Sonicwall or through Sonicwall.
0
 
LVL 32

Expert Comment

by:nappy_d
ID: 24796912
The if you want to, logon to the Sonicwall Web GUI and click on logs.
0
 

Author Comment

by:kallatech
ID: 24797133
I did that but it doesn't give me the option to to track useage by ip address.
0
How your wiki can always stay up-to-date

Quip doubles as a “living” wiki and a project management tool that evolves with your organization. As you finish projects in Quip, the work remains, easily accessible to all team members, new and old.
- Increase transparency
- Onboard new hires faster
- Access from mobile/offline

 

Author Comment

by:kallatech
ID: 24797772
Leaving work will not be able to test any solutions until tomorrow 8 am EST.
0
 
LVL 32

Expert Comment

by:nappy_d
ID: 24800247
You will need 3rd party software.  Sonicwall does not give your much options.
0
 

Author Comment

by:kallatech
ID: 24806336
Have you used the product that you mentioned in your post?
0
 
LVL 32

Accepted Solution

by:
nappy_d earned 125 total points
ID: 24806956
I had a client a few years back that I used it for.  It seemed to do the job.  Here is a link of some of the features it supports http://www.manageengine.com/products/firewall/help/firewall-reports/web-protocol-reports.html
0
 

Author Closing Comment

by:kallatech
ID: 31600557
Thank you for your help.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

In this tutorial I will show you with short command examples how to obtain a packet footprint of all traffic flowing thru your Juniper device running ScreenOS. I do not know the exact firmware requirement, but I think the fprofile command is availab…
Hi All,  Recently I have installed and configured a Sonicwall NS220 in the network as a firewall and Internet access gateway. All was working fine until users started reporting that they cannot use the Cisco VPN client to connect to the customer'…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now