NETGEAR UTM25EW-100NAS Router User Manual


 
ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
System Logs and Error Messages C-13
v1.0, September 2009
Spam Logs
This section describes logs that are generated when the UTM filters spam e-mail messages.
Message 2009-08-01 00:00:01 HTTP 192.168.1.3 192.168.35.165
http://192.168.35.165/testcases/files/virus/normal/%b4%f3%d3%da2048.rar
Proxy Block
Explanation Logs that are generated when Web content is blocked because it uses a proxy.
The message shows the date and time, protocol, client IP address, server IP
address, URL, reason for the action, and action that is taken.
Recommended Action None
Message 2009-08-01 00:00:01 HTTP 192.168.1.3 192.168.35.165
http://192.168.35.165/testcases/files/virus/normal/%b4%f3%d3%da2048.rar
Keyword Block
Explanation Logs that are generated when Web content is blocked because it violates a
blocked keyword. The message shows the date and time, protocol, client IP
address, server IP address, URL, reason for the action, and action that is
taken.
Recommended Action None
Table C-19. Content Filtering and Security Logs: Spam
Message 2009-02-28 23:59:59 SMTP 192.168.1.2 192.168.35.165
xlzimap@test.com xlzpop3@test.com Blocked by customized blacklist. 0
RBL Block
Explanation Logs that are generated when spam messages are blocked by the RBL. The
message shows the date and time, protocol, client IP address, server IP
address, sender, recipient, subject line, mechanism that detected the spam,
and action that is taken.
Recommended Action None
Message 2009-02-28 23:59:59 SMTP 192.168.1.2 192.168.35.165
xlzimap@test.com xlzpop3@test.com Blocked by customized blacklist. 0
Heuristic Block
Explanation Logs that are generated when spam messages are blocked by Distributed
Spam Analysis. The message shows the date and time, protocol, client IP
address, server IP address, sender, recipient, subject line, mechanism that
detected the spam, and action that is taken.
Recommended Action None
Table C-18. Content Filtering and Security Logs: Web Filtering and Content Filtering