Start a conversation

Security Logs in Kerio Control

Logs keep information records of selected events occurred in or detected by Kerio Control. Each log is displayed in a window in the Logs section. For this particular content, we will focus on security logs in Kerio Control. Records of the following types may appear in the log:

Intrusion Prevention System Logs

Records of detected intrusions or traffic from IP addresses that are included in web databases of known intruders (blacklists).

[02/Mar/2013 08:54:38] IPS: Packet drop, severity: High, Rule ID: 1:2010575 ET TROJAN ASProtect/ASPack Packed Binaryproto:TCP, ip/port:95.211.98.71:80(hosted-by.example.com) > 192.168.48.131:49960(wsmith-pc.company.com,user:wsmith)

Message component Description
IPS: Packet drop

The particular intrusion had the action set for Log and drop (in case of the Log action, IPS: Alert).

severity: High

Severity level.

Rule ID: 1:2010575

Number identifier of the intrusion (this number can be used for the definition of exceptions from the intrusion detection system, i.e. in the system's advanced settings).

ET TROJAN ASProtect/ASPack Packed Binary

Intrusion name and description (only available for some intrusions).

proto:TCP

Traffic protocol.

ip/port:95.211.98.71:80(hosted-by.example.com)

Source IP address and port of the detected packet; the brackets provide information of the DNS name of the particular computer, in case that it is identifiable.

> 192.168.48.131:49960(wsmith-pc.company.com,user:wsmith)

Destination IP address and port in the detected packet; the brackets provide the DNS name of the particular host (if identifiable) or the name of the user connected to the firewall from the particular local host.


Anti-spoofing Log Records

Messages about packets that were captured by the Anti-spoofing module (packets with invalid source IP address).

[17/Jul/2013 11:46:38] Anti-Spoofing: Packet from LAN, proto:TCP, len:48, ip/port:61.173.81.166:1864 > 195.39.55.10:445, flags: SYN, seq:3819654104 ack:0, win:16384, tcplen:0

Message component Description
packet from

Packet direction (eitherfrom, i.e. sent via the interface, or to, i.e. received via the interface).

LAN

Name of the interface on which the traffic was detected.

proto:

Transport protocol (TCP, UDP, etc.).

len:

Packet size in bytes (including the headers) in bytes.

ip/port:

Source IP address, source port, destination IP address and destination port.

flags:

TCP flags.

seq:

The sequence number of the packet (TCP only).

ack:

Acknowledgment sequence number (TCP only).

win:

Size of the receive window in bytes (it is used for data flow control TCP only).

tcplen:

TCP payload size (i.e. size of the data part of the packet) in bytes (TCP only).


FTP protocol parser log records

Attack attempt detected — a foreign IP address in the PORT command

[17/Jul/2013 11:55:14] FTP: Bounce attack attempt: client: 1.2.3.4, server: 5.6.7.8, command: PORT 10,11,12,13,14,15

Suspicious server reply with a foreign IP address

[17/Jul/2013 11:56:27] FTP: Malicious server reply: client: 1.2.3.4, server: 5.6.7.8, response: 227 Entering Passive Mode (10,11,12,13,14,15)


Failed User Authentication Log Records

Authentication: Service: Client: IP address: reason

Message component Description
service

The Kerio Control service to which the client connects.

WebAdmin

Refers to "web administration interface".

WebInterface

Refers to "client interface".

HTTP Proxy

Refers to user authentication on the proxy server.

VPN Client

Encapsulates both Kerio VPN and IPsec VPN.

Admin

Refers to messages from the Console.

IP address

IP address of the computer from which the user attempted to authenticate.

reason

Reason of the authentication failure (nonexistent user/ wrong password).


Information Kerio Control Engine Start/Shutdown and other Kerio Control Components

Start and shutdown of the Kerio Control Engine:

[17/Jun/2013 12:11:33] Engine: Startup

[17/Jun/2013 12:22:43] Engine: Shutdown

Start and shutdown of the Intrusion Prevention Engine:

[28/Jun/2013 10:58:58] Intrusion Prevention engine: Startup

[28/Jun/2013 11:18:52] Intrusion Prevention engine: Shutdown

 
Updating Components

Kerio Control uses components (antivirus engine and signatures, Intrusion Prevention signatures and blacklists). Updates of these components are logged in the Security log.

[09/Jul/2013 17:00:58] IPS: Basic rules successfully updated to version 1.176

[10/Jul/2013 11:56:18] Antivirus update: Kerio Antivirus database has been successfully updated. Kerio Antivirus engine version/Signature count: (AVCORE v2.1 Linux/x86_64 11.0.1.12 (Sep 29, 2016)/8528221) is now active.
Choose files or drag and drop files
Was this article helpful?
Yes
No
  1. Priyanka Bhotika

  2. Posted

Comments