It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda CloudGen Firewall

CC FWAUDIT Tab

  • Last updated on

The FWAUDIT tab provides access to the Firewall Audit viewer. The Firewall Audit viewer displays information related to firewall sessions on managed CloudGen Firewalls. The type of data collected depends on the FW Audit settings on the individual units. For more information, see FW Audit. Similar to the Log Viewer directly on the firewall, the Firewall Audit viewer supports navigating to a dedicated date/time and browsing backward and forward.

fwaudit.png

The FWAUDIT page lists firewall audit data information and provides several filtering options. To display log files for one or several managed firewall units, double-click the firewall in the left column to select it and click the down arrow icon in the upper right of the ribbon bar (l2.png).

The columns on the FWAUDIT page display the following information:

  • Date/Time – Date and time the operation was performed.
  • Box – The affected firewall unit.
  • Operation – Displays the operation.
  • Type – The operation type.
  • Proto – The protocol used.
  • Src IF – The source interface.
  • Src IP – The source IP address.
  • Src Port – The source port.
  • Src MAC – The source MAC address, if applicable.
  • Dst IP – The destination IP address.
  • Dst Port – The destination port.
  • Dst Service – The destination service.
  • Dst IF – The destination interface.
  • Rule – The access or application rule that applies.
  • Info – Displays additional information, if available.
  • DstNAT – The destination NAT address.
  • SrcNAT – The source NAT address.
  • Count – Displays how often the operation was carried out.
  • Duration – Duration of the operation.
  • In Bytes – Amount of incoming traffic in bytes.
  • In Pkts – Amount of incoming traffic in packets.
  • Out Bytes – Amount of outgoing traffic in bytes.
  • Out Pkts – Amount of outgoing traffic in packets.
  • Total Bytes – Total traffic in bytes.
  • User – The user affected by the operation.

Filtering Options

Clicking the first filter icon (Selection) in the ribbon bar opens the Selection menu, which provides the following options:

cc_selection.png

  • Traffic Selection – From the Traffic Selection list, you can select the following options to filter for certain traffic types:
    • Forward  Displays the traffic on the Forwarding Firewall.
    • Local In  Displays the incoming traffic on the Host Firewall.
    • Local Out  Displays the outgoing traffic from the Host Firewall.
    • Loopback Displays the traffic over the loopback interface.
  • Event Selection – From the Event Selection list, you can select the following options to filter for certain traffic types:
    • Allowed – Displays all allowed events.
    • Blocked – Displays all blocked events.
    • Dropped – Displays all dropped events.
    • Fail  Displays all failed events.
    • ARP  Displays all ARP requests.
    • IPS Hit  Displays all events detected by the IPS.
    • Removed  Displays all removed events. 

Clicking the second filter icon ( Filter ) opens the Filter menu, which provides the following options:

cc_filter.png

  • Rule – Allows setting a filter for a specific rule.
  • Proto  Allows setting a filter for a specific protocol.
  • Source/Dest. – Allows setting a filter for a specific IP address/range that matches either source or destination.
  • Interface  Allows setting a filter for a specific interface (for example, eth0).
  • Addr.  Allows setting a filter for a specific destination IP address/range.
  • Srv.  Allows setting a filter for a specific service.
  • Port  Allows setting a filter for a specific port.
  • Src/Dst-Interface – Allows setting a filter for the source/destination interface.
  • Source – Allows setting a filter for the source NAT address.
  • Dest. NAT – Allows setting a filter for the destination NAT address.
  • User – Allows setting a filter for the user affected by the operation.

Note that some fields allow the use of wildcards (*?; !*?). Example: !Amazon* excludes all entries starting with Amazon; Y*|A* includes all entries starting with "Y" or "A". 

On the top right of the ribbon bar of the Audit Log page, you can specify a time and date to view logs that were created within a set time interval.

Log File Display Modes

The FWAUDIT page lists firewall audit data information according to the specified filter selection and time interval. By default, all entries are shown line by line in the list (Log File Mode). The Log File Mode drop-down list provides two display options:

  • Log File Mode – Log files are shown line by line according to the specified filter selection and time interval.
  • Accumulation Mode – Log files are shown accumulated by specified merging criteria. This provides a more general overview of similar event or session categories.
Log File Mode

By default, all entries are shown line by line in the list (Log File Mode). In the navigation bar on the top right of the ribbon bar, you can select how information is displayed in the list. Use the Max Entries field to adjust the number of entries displayed in the list. To view a log entry, double-click it.

ccmode_01.png

You can navigate through the log entries with the following navigation buttons:

l1.png– Browse backward from the current entry.

l2.png – Display log files / filtering results for selected criteria such as the specified time and date.

l3.png – Browse forward from the current entry.

l4.png – Browse to the end of the log.

Accumulation Mode

Accumulation allows you to group events by specific criteria, such as source, protocol, or access rule . To accumulate events, you must select a time interval from the fields provided in the ribbon bar. Select Accumulated Event Mode from the Log File Mode drop-down list, and click the icon next to the filter ( Accumulation ) to open the Accumulation filter.

ccacc_01.png

The Accumulation filter provides the following options:

  • Operation – Accumulate entries by operation.
  • Type – Accumulate entries by operation type.
  • Source Address – Accumulate entries by source IP address/range.
  • Destination Address – Accumulate entries by destination IP address.
  • Service – Accumulate entries by service.
  • Protocol – Accumulate entries by the protocol used.
  • Rule – Accumulate entries by access or application rule.
  • Info – Accumulate entries by additional information.
  • Boxname – Accumulate entries by box name
  • User – Accumulate entries by affected user.

To display the log files and filtering results for the selected criteria, click the down arrow icon in the upper right of the ribbon bar (l2.png).  

ccacc_02.png

Use the Max Entries field to adjust the number of entries displayed in the list.