beautypg.com

Configuring monitoring, reporting, and logging, Configuring firewall logging, Configuring web proxy logging – HP ProLiant DL320 G4 Server User Manual

Page 22

background image

Managing and maintaining the firewall 22

Configuring monitoring, reporting, and logging

The ProLiant DL320 Security Server has a comprehensive logging and reporting facility. Configure firewall
logging and web proxy logging immediately to get the full benefit from the feature set.

Configuring firewall logging

The firewall log records connections from Secure NAT and firewall clients on the internal and external
networks. Firewall logging can be configured to use one of several storage methods, each with its own
advantages and disadvantages.

File logging

SQL database logging

MSDE database logging

To configure the Microsoft

®

firewall service basic logging properties:

1.

In the scope pane of the ISA Server 2004 management console, expand your server name, and then
click the Monitoring node.

2.

In the details pane, click the Logging tab.

3.

In the task pane, click the Tasks tab, and click Configure Firewall Logging. The Log tab
appears in the Firewall Logging Properties dialog box.

4.

Select the log storage format that best fits. The File format option is best when copying log file
information to a third-party application on another computer. The SQL database format option is best
when there is an SQL database on the internal network and you have the expertise to manage an
SQL database. The MSDE database format option is an excellent option when SQL text-based
logging is not used.

5.

Select the File format option. From the Format list, select the ISA Server file format. This format
saves log file entries using the local time configured on the ProLiant DL320 Security Server to stamp
the log entries.

6.

Click Apply>OK.

7.

Click Apply at the top of the details pane to save the changes and update the firewall policy.

NOTE: When using file-based logging, the real-time log file cannot perform queries.

Configuring web proxy logging

The web proxy logs contain information about connections from web proxy clients. Web proxy logging
can be configured to use many different storage methods. Each storage method has its own advantages
and disadvantages. Web proxy storage methods include:

File logging

SQL database logging

MSDE database logging

To configure the web proxy logging properties:

1.

In the scope pane of the ISA Server 2004 management console, expand your server name, and then
click the Monitoring node.

2.

In the details pane, click the Logging tab.

3.

In the task pane, click the Tasks tab, and then click Configure Web Proxy Logging. The Log
tab appears in the Web Proxy Properties dialog box.

4.

Select the log storage format that best meets your needs. The file format option is best when copying
log file information to a third-party application on another computer on the internal network. The

This manual is related to the following products: