﻿<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>LevelBlue Knowledge Base » Knowledgebase » Legacy Products » Firewall Suite</title><generator>InstantKB.NET 2.0.6</generator><description>LevelBlue Knowledge Base</description><link>https://support.levelblue.com/kb/</link><webMaster>website@m86security.com</webMaster><lastBuildDate>Tue, 21 Apr 2026 14:14:16 GMT</lastBuildDate><ttl>20</ttl><item><title>What versions of Marshal Security products are currently supported by LevelBlue Technical Support?</title><link>https://support.levelblue.com/kb/Goto10920.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;MailMarshal (SEG) &lt;/li&gt;    &lt;li&gt;MailMarshal ECM/MailMarshal Exchange &lt;/li&gt;    &lt;li&gt;MailMarshal SPE &lt;/li&gt;    &lt;li&gt;MailMarshal SES &lt;/li&gt;    &lt;li&gt;Marshal Reporting Console &lt;/li&gt;    &lt;li&gt;WebMarshal &lt;/li&gt;    &lt;li&gt;Bitdefender for Marshal&lt;/li&gt;    &lt;li&gt;McAfee for Marshal &lt;/li&gt;    &lt;li&gt;Sophos for Marshal &lt;/li&gt;    &lt;li&gt;Other Products    &lt;ul&gt;        &lt;li&gt;MailMarshal Appliance e10000 &lt;/li&gt;        &lt;li&gt;MailMarshal Management Pack for MOM &lt;/li&gt;        &lt;li&gt;MailMarshal Management Pack for SCOM &lt;/li&gt;        &lt;li&gt;Marshal EndPoint Security &lt;/li&gt;        &lt;li&gt;Security Reporting Center &lt;/li&gt;        &lt;li&gt;Firewall Suite &lt;/li&gt;        &lt;li&gt;imMarshal for MSN &lt;/li&gt;        &lt;li&gt;Counterspy for Marshal &lt;/li&gt;        &lt;li&gt;Kaspersky for Marshal&lt;/li&gt;        &lt;li&gt;PestPatrol for Marshal &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;p&gt;What versions of Content Security (Marshal) products are currently supported by LevelBlue Technical Support? &lt;/p&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;For full details about supported versions of current products, see the articles linked below:&lt;/p&gt;&lt;a name="seg"&gt;&lt;/a&gt;&lt;blockquote style="margin-right: 0px;" dir="ltr"&gt;&lt;/blockquote&gt;&lt;h3&gt;Premises Email Security&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20961.aspx" class="ApplyClass" target="_blank"&gt;Article Q20961&lt;/a&gt; covers the following products:    &lt;ul&gt;        &lt;li&gt;MailMarshal (SEG) &lt;/li&gt;        &lt;li&gt;MailMarshal ECM/MailMarshal Exchange &lt;/li&gt;        &lt;li&gt;Secure Email Server (SES) &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Web Content Security&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20962.aspx" class="ApplyClass" target="_blank"&gt;Article Q20962&lt;/a&gt; covers WebMarshal. &lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Service Provider Email Security&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20963.aspx" class="ApplyClass" target="_blank"&gt;Article Q20963&lt;/a&gt; covers MailMarshal SPE. &lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Anti-Virus and Reporting&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20964.aspx" class="ApplyClass" target="_blank"&gt;Article Q20964&lt;/a&gt; covers the following products:    &lt;ul&gt;        &lt;li&gt;Bitdefender for Marshal&lt;/li&gt;        &lt;li&gt;McAfee for Marshal &lt;/li&gt;        &lt;li&gt;Sophos for Marshal &lt;/li&gt;        &lt;li&gt;Marshal Reporting Console&lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;hr /&gt;&lt;h3&gt;Deprecated and Discontinued Products&lt;/h3&gt;&lt;dl&gt;    &lt;dt&gt;e10000 (MailMarshal Node Appliance)&lt;/dt&gt;    &lt;dd&gt;End of support: March 31, 2011&lt;/dd&gt;    &lt;dt&gt;EndPoint Security&lt;/dt&gt;    &lt;dd&gt;    End of support: May 1, 2013&lt;/dd&gt;    &lt;dt&gt;MailMarshal Management Pack for MOM&lt;/dt&gt;    &lt;dd&gt;End of support: May 1, 2013&lt;/dd&gt;    &lt;dt&gt;MailMarshal Management Pack for SCOM&lt;/dt&gt;    &lt;dd&gt;End of support: May 1, 2013&lt;/dd&gt;    &lt;dt&gt;Security Reporting Center (Windows Version)&lt;/dt&gt;    &lt;dd&gt;End of support: December 31, 2009&lt;/dd&gt;    &lt;dt&gt;Security Reporting Center (Solaris Version)&lt;/dt&gt;    &lt;dd&gt;Withdrawn&lt;/dd&gt;    &lt;dt&gt;Firewall Suite&lt;/dt&gt;    &lt;dd&gt;Withdrawn&lt;/dd&gt;    &lt;dt&gt;imMarshal for MSN&lt;/dt&gt;    &lt;dd&gt;Withdrawn&lt;/dd&gt;    &lt;dt&gt;Counterspy for Marshal&lt;/dt&gt;    &lt;dd&gt;End of support: January 1, 2014&lt;/dd&gt;    &lt;dt&gt;Kaspersky for Marshal&lt;/dt&gt;    &lt;dd&gt;End of support: November 22, 2023&lt;/dd&gt;    &lt;dt&gt;PestPatrol for Marshal&lt;/dt&gt;    &lt;dd&gt;End of support: January 1, 2014&lt;/dd&gt;    &lt;dt&gt;&lt;br /&gt;    &lt;/dt&gt;&lt;/dl&gt;&lt;dl&gt;&lt;em&gt;    &lt;dt&gt;This article was previously published as: &lt;/dt&gt;    &lt;dd&gt;NETIQKB33882 &lt;/dd&gt;    &lt;/em&gt;&lt;/dl&gt;</description><pubDate>Sun, 26 Nov 2023 18:02:27 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>What is NETSTAT?</title><link>https://support.levelblue.com/kb/Goto10875.aspx</link><description>&lt;h2&gt;&lt;/h2&gt;&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;MailMarshal (SEG) &lt;/li&gt;    &lt;li&gt;WebMarshal &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;What is NETSTAT?&lt;p&gt; &lt;/p&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;You can use the &lt;strong&gt;NETSTAT&lt;/strong&gt; command to check the operation of local ports to see if they are configured properly and if they are receiving data. &lt;/p&gt;&lt;p&gt;You can access a wealth of helpful information about the NETSTAT utility from the Help utility on your Microsoft Windows workstation or server. This information can be found by clicking &lt;strong&gt;START | HELP | INDEX&lt;/strong&gt; and by entering the keyword &lt;strong&gt;netstat&lt;/strong&gt;. &lt;/p&gt;&lt;table cellspacing="1" cellpadding="7" border="1"&gt;    &lt;tbody&gt;        &lt;tr&gt;            &lt;th style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;&lt;strong&gt;Port&lt;/strong&gt;&lt;/p&gt;            &lt;/th&gt;            &lt;th style="height: 16px; width: 25%;" valign="top"&gt;&lt;strong&gt;&lt;/strong&gt;            &lt;p&gt;&lt;strong&gt;Protocol&lt;/strong&gt;&lt;/p&gt;            &lt;/th&gt;            &lt;th style="height: 16px; width: 35%;" valign="top"&gt;&lt;strong&gt;&lt;/strong&gt;            &lt;p&gt;&lt;strong&gt;NETSTAT - WinNT&lt;/strong&gt;&lt;/p&gt;            &lt;/th&gt;            &lt;th style="height: 16px; width: 31%;" valign="top"&gt;&lt;strong&gt;&lt;/strong&gt;            &lt;p&gt;&lt;strong&gt;NETSTAT - UNIX&lt;/strong&gt;&lt;/p&gt;            &lt;/th&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 15px; width: 9%;" valign="top"&gt;            &lt;p&gt;21&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 15px; width: 25%;" valign="top"&gt;            &lt;p&gt;FTP&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 15px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 21&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 15px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 21&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;25&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;SMTP&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 25&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 25&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;53&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;DNS (Note 1)&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 53&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;Netstat -an 1 | grep 53&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;80&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;HTTP&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 80&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 80&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 32px; width: 9%;" valign="top"&gt;            &lt;p&gt;99&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 32px; width: 25%;" valign="top"&gt;            &lt;p&gt;WebTrends Remote Reporting&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 32px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 99&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 32px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 99&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;110&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;POP3&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 110&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 110&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;137&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;WINS (Note 2)&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 137&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 137&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;514&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;SYSLOG&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 514&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 514&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;18184&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;OPSEC LEA&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 18184&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 18184&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;Note 1:&lt;/strong&gt; &lt;strong&gt;DNS&lt;/strong&gt; is the acronym for &lt;em&gt;Domain Name Service&lt;/em&gt;, a name resolution scheme that originated with the Berkeley version of Unix. DNS is used throughout the Internet for host-name resolution and is a constantly evolving protocol. Along with host-name resolution, it helps in e-mail routing and other TCP/IP-based application services. The most popular Unix-based implementation of DNS is the Berkeley Internet Name Daemon, or BIND.    &lt;ul&gt;        &lt;li&gt;SEG/MailMarshal SMTP uses DNS port 53 TCP and UDP. &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;    &lt;li&gt;&lt;strong&gt;Note 2: WINS&lt;/strong&gt; is the acronym for &lt;em&gt;Windows Internet Naming Service&lt;/em&gt;, Microsoft's extension of the NetBIOS name resolution scheme. Computers utilize port 137 for WINS resolution.    &lt;ul&gt;        &lt;li&gt;If WINS resolution is enabled, local machine names can be resolved without explicit DNS entries. &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Once you type the command, look for a response:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;    &lt;p&gt; &lt;/p&gt;    &lt;li&gt;If nothing appears, the port is not being utilized.    &lt;ul&gt;        &lt;li&gt;If you are checking the response from a Marshal product, check to see if the appropriate service is running. If it is, you may need to restart the server computer and run NETSTAT again. &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;    &lt;li&gt;    &lt;p&gt;If the word &lt;em&gt;"ESTABLISHED"&lt;/em&gt; appears, then the port is configured properly and it is receiving data. &lt;/p&gt;    &lt;p&gt; &lt;/p&gt;    &lt;/li&gt;    &lt;li&gt;If the words &lt;em&gt;"TIME-WAIT"&lt;/em&gt; appear, the port is configured properly but it is not receiving data.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;&lt;/em&gt;&lt;/p&gt;&lt;dl&gt;&lt;em&gt;    &lt;dt&gt;This article was previously published as: entries&lt;/dt&gt;    &lt;dd&gt;NETIQKB2609 &lt;/dd&gt;    &lt;/em&gt;&lt;/dl&gt;</description><pubDate>Wed, 01 Apr 2020 00:00:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>How can I test email connectivity to a server?</title><link>https://support.levelblue.com/kb/Goto10879.aspx</link><description>&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;What is TELNET? &lt;/li&gt;    &lt;li&gt;How can I test email connectivity to a server? &lt;/li&gt;    &lt;li&gt;Are there Telnet commands specific for testing MailMarshal SEG/MailMarshal? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p dir="ltr"&gt;The first step in troubleshooting protocol problems is to verify that you can establish a successful TCP connection to the host. The easiest way to test this is by using the &lt;b&gt;telnet&lt;/b&gt; command to connect to the required port. &lt;em&gt;Pinging a host is not a reliable test.&lt;/em&gt; The Ping utility does not tell you that the host is listening on a specific port. It is only an indication that a lower-level packet was able to find its way to the correct IP address. In addition, many companies block ping or ICMP packets from entering their networks. Telnet allows you to test exactly the same type of connection that is used to send email. &lt;/p&gt;&lt;blockquote style="margin-right: 0px;" dir="ltr"&gt;&lt;p&gt;&lt;strong&gt;Note: &lt;/strong&gt;With recent versions of Windows, the Telnet client is not installed by default. If necessary, use Server Manager to add the feature "Telnet Client".&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;You can use a Telnet utility to test the basic operation of the SEG Receiver. To get a feel for how Telnet works, try to use Telnet to connect to your SEG computer on port 25. The syntax is: &lt;/p&gt;&lt;ul&gt;    &lt;p&gt;&lt;code&gt;telnet &amp;lt;ip_address&amp;gt; &amp;lt;port&amp;gt;&lt;/code&gt; &lt;/p&gt;&lt;/ul&gt;&lt;p&gt;For example: &lt;/p&gt;&lt;ul&gt;    &lt;p&gt;&lt;code&gt;telnet 127.0.0.1 25&lt;/code&gt;&lt;br /&gt;    &lt;code&gt;telnet mail.domain.tld 25 &lt;/code&gt;(&lt;code&gt;.tld&lt;/code&gt; represents "top level domain") &lt;/p&gt;&lt;/ul&gt;&lt;p&gt;Both of the examples above can be used (with the correct values); however, the first example is the most reliable. When addressing systems by their IP address, you eliminate the possibility of name resolution problems. The example above should bring up a Telnet window and a successful connect message indicating that you are ready to send to the host. This indicates that the host is listening on port 25, and that you can probably send an SMTP message to the host. The example above is similar to what the SEG Sender does when it connects to send email. At this point, the Sender starts sending SMTP commands to the host to initiate message transfer. &lt;/p&gt;&lt;p&gt;Many other protocols including POP3, IMAP4, and NNTP (Net News) work in a similar way. They include commands that are sent to the host and the replies that are expected. After you have concluded that a successful connection can be made to the correct port, you can start reviewing the actual responses given to a host when commands are issued. &lt;/p&gt;&lt;p dir="ltr"&gt;The best testing method is to actually issue the commands to the host by using a Telnet command. This method is effective if you know exactly what you need to send and how to do it, or if you know what your client/server program is trying to send. &lt;/p&gt;&lt;blockquote style="margin-right: 0px;" dir="ltr"&gt;&lt;p&gt;&lt;strong&gt;Tip: &lt;/strong&gt;If you find you are making mistakes when typing commands in a command window, you might want to use a script file to enter the set of commands. A simple Windows Scripting File example is attached to this article. Unzip the archive, modify the WSF file as required, and then simply double-click it to run the script. The progress will display in a command window.&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;b&gt;Basic Mail and News Protocol Command and Response Overview&lt;/b&gt; &lt;/p&gt;&lt;p&gt;All commands are terminated with a carriage return/line feed (CR/LF). &lt;/p&gt;&lt;p&gt;(&lt;code&gt;.tld&lt;/code&gt; stands for top level domain, for instance "com".) &lt;/p&gt;&lt;p&gt;&lt;table cellspacing="0" cellpadding="5" width="533" border="1"&gt;    &lt;tbody&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;b&gt;&lt;span style="font-size: 13px;"&gt;SMTP Commands&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;&lt;b&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Expected Response&lt;/span&gt;&lt;/p&gt;            &lt;/b&gt;&lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;&lt;b&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Description&lt;/span&gt;&lt;/p&gt;            &lt;/b&gt;&lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;HELO&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;250 OK&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Initiates the conversation between hosts.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%; white-space: nowrap;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;MAIL FROM: &amp;lt;user@domain.tld&amp;gt;&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;250 OK&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Identifies who is sending the message. Include the email address between angle brackets &lt;em&gt;(the brackets are required).&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;RCPT TO: &amp;lt;user@domain.tld&amp;gt;&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;250 OK&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Identifies whom the message is to. Include the email address between angle brackets &lt;em&gt;(the brackets are required).&lt;/em&gt;&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;DATA&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;354 Send Data&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Identifies the start point for message data.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;. (a single period)&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;250 OK&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Identifies the end point for message data.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;QUIT&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;221 &lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Terminates the session.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td valign="middle" colspan="3"&gt;            &lt;ul&gt;                &lt;li&gt;&lt;span style="font-size: 13px;"&gt;The &lt;b&gt;HELO&lt;/b&gt; command is issued and the server responds, indicating that it understands and accepts the command.&lt;/span&gt; &lt;/li&gt;                &lt;li&gt;&lt;span style="font-size: 13px;"&gt;&lt;b&gt;MAIL FROM&lt;/b&gt; tells the host who is sending the message. Again, the server responds successfully.&lt;/span&gt; &lt;/li&gt;                &lt;li&gt;&lt;span style="font-size: 13px;"&gt;&lt;b&gt;RCPT TO&lt;/b&gt; tells the host whom to deliver this message to.&lt;/span&gt; &lt;/li&gt;            &lt;/ul&gt;            &lt;/td&gt;        &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;p&gt;&lt;table cellspacing="0" cellpadding="5" width="533" border="1"&gt;    &lt;tbody&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;b&gt;&lt;span style="font-size: 13px;"&gt;POP3 Commands&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;&lt;b&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Expected Response&lt;/span&gt;&lt;/p&gt;            &lt;/b&gt;&lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;&lt;b&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Description&lt;/span&gt;&lt;/p&gt;            &lt;/b&gt;&lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;USER ntdomain/ntaccount/alias&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;+OK&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Initiates the authentication process.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;PASS password&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;+OK&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Specifies the password for the user's account.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;LIST&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;+OK&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Lists available messages to download.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;RETR Message#&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;The Message Text&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Retrieves the message text of Message#.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;DELE &lt;i&gt;Message#&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;+OK&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Deletes Message#.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 37%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;QUIT&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;+OK&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 40%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Terminates the session.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td valign="middle" colspan="3"&gt;            &lt;ul&gt;                &lt;li&gt;&lt;span style="font-size: 13px;"&gt;The &lt;b&gt;USER&lt;/b&gt; command, followed by the appropriate logon credentials, is used to log on to the POP3 mailbox.&lt;/span&gt; &lt;/li&gt;                &lt;li&gt;&lt;span style="font-size: 13px;"&gt;The &lt;b&gt;PASS&lt;/b&gt; command issues the password to gain access.&lt;/span&gt; &lt;/li&gt;                &lt;li&gt;&lt;span style="font-size: 13px;"&gt;Exchange Server returns "+OK User successfully logged on."&lt;/span&gt; &lt;/li&gt;            &lt;/ul&gt;            &lt;/td&gt;        &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;p&gt;&lt;table cellspacing="0" cellpadding="5" width="533" border="1"&gt;    &lt;tbody&gt;        &lt;tr&gt;            &lt;td style="width: 41%;" valign="middle"&gt;            &lt;p&gt;&lt;b&gt;&lt;span style="font-size: 13px;"&gt;IMAP4 Commands&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;&lt;b&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Expected Response&lt;/span&gt;&lt;/p&gt;            &lt;/b&gt;&lt;/td&gt;            &lt;td style="width: 36%;" valign="middle"&gt;&lt;b&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Description&lt;/span&gt;&lt;/p&gt;            &lt;/b&gt;&lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 41%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;LOGIN ntdomain/ntaccount/alias password&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;OK LOGIN&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 36%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Logs on to the mailbox.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 41%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;SELECT folder&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Folder mode &amp;amp; OK SELECT&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 36%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Selects a folder to view.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 41%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;FETCH Message#&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Message text &amp;amp; OK FETCH&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 36%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Retrieves the message by Message#.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 41%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;STORE Message Flags/flag&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;OK STORE&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 36%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Marks a message for deletion or read/unread.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 41%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;EXPUNGE&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;OK&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 36%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Deletes all marked messages.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 41%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;LOGOUT&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 23%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;OK&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 36%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Terminates the session.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td valign="middle" colspan="3"&gt;            &lt;ul&gt;                &lt;li&gt;&lt;span style="font-size: 13px;"&gt;All commands issued to an IMAP4 server must be prefixed with a command identifier. The client can interpret that to keep track of command and response pairs.&lt;/span&gt; &lt;/li&gt;                &lt;li&gt;&lt;span style="font-size: 13px;"&gt;For example, when your IMAP client issues &lt;b&gt;local SELECT inbox&lt;/b&gt;, the server responds with &lt;b&gt;local OK&lt;/b&gt;.&lt;/span&gt; &lt;/li&gt;                &lt;li&gt;&lt;span style="font-size: 13px;"&gt;A &lt;b&gt;NO&lt;/b&gt; response is given when a command is denied.&lt;/span&gt; &lt;/li&gt;            &lt;/ul&gt;            &lt;/td&gt;        &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;p&gt;&lt;table cellspacing="0" cellpadding="5" width="533" border="1"&gt;    &lt;tbody&gt;        &lt;tr&gt;            &lt;td style="width: 48%;" valign="middle"&gt;            &lt;p&gt;&lt;b&gt;&lt;span style="font-size: 13px;"&gt;NNTP Commands&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 22%;" valign="middle"&gt;&lt;b&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Expected Response&lt;/span&gt;&lt;/p&gt;            &lt;/b&gt;&lt;/td&gt;            &lt;td style="width: 30%;" valign="middle"&gt;&lt;b&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Description&lt;/span&gt;&lt;/p&gt;            &lt;/b&gt;&lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 48%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;AUTHINFO USER ntdomain/ntaccount/username&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 22%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;381 More Info Needed&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 30%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Supplies authentication information.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 48%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;AUTHINFO PASS password&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 22%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;281 Accepted.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 30%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Supplies password for authentication.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 48%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;LIST&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 22%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;List Of Groups&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 30%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Lists all groups available.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 48%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;GROUP group&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 22%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Group Specifications&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 30%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Sets the current group.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 48%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;ARTICLE #&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 22%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Article Text&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 30%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Retrieves an article by #.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 48%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;QUIT&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 22%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;205&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="width: 30%;" valign="middle"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;Terminates the session.&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td valign="middle" colspan="3"&gt;            &lt;p&gt;&lt;span style="font-size: 13px;"&gt;There are two modes of NNTP access: authenticated and anonymous. Authentication requires the first two commands listed (&lt;b&gt;AUTHINFO USER&lt;/b&gt; and &lt;b&gt;AUTHINFO PASS&lt;/b&gt;).&lt;/span&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;p&gt;&lt;i&gt;&lt;dl&gt;    &lt;dt&gt;This article was previously published as: &lt;/dt&gt;    &lt;dd&gt;NETIQKB2699&lt;br /&gt;    NETIQKB35161 &lt;/dd&gt;&lt;/dl&gt;&lt;/i&gt;&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;p&gt; &lt;/p&gt;</description><pubDate>Sun, 01 Mar 2020 00:00:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Where do I send a feature request for a LevelBlue Marshal product?</title><link>https://support.levelblue.com/kb/Goto12703.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;MailMarshal (SEG)&lt;/li&gt;    &lt;li&gt;MailMarshal ECM/MailMarshal Exchange&lt;/li&gt;    &lt;li&gt;MailMarshal SPE&lt;/li&gt;    &lt;li&gt;WebMarshal&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Where do I send a feature request for a LevelBlue Marshal product? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;p&gt;If you want to request a new feature or you want to suggest an improvement for any product, you can &lt;a href="https://support.levelblue.com/contact-support.asp" class="ApplyClass" target="_blank"&gt;contact Technical Support&lt;/a&gt;. You can also enquire through your account manager or reseller.&lt;/p&gt;</description><pubDate>Sun, 01 Mar 2020 00:00:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>What is the WELF log file format?</title><link>https://support.levelblue.com/kb/Goto10899.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;WebMarshal 6.X &lt;/li&gt;    &lt;li&gt;WebMarshal 7.X &lt;/li&gt;    &lt;li&gt;Security Reporting Center 2.X &lt;/li&gt;    &lt;li&gt;WebTrends Firewall Suite &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;What is the WELF log file format?&lt;p&gt; &lt;/p&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;WELF&lt;/strong&gt; is the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;W&lt;/span&gt;&lt;/strong&gt;ebTrends &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;E&lt;/span&gt;&lt;/strong&gt;nhanced &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;L&lt;/span&gt;&lt;/strong&gt;og file &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;F&lt;/span&gt;&lt;/strong&gt;ormat. &lt;/p&gt;&lt;p&gt;The WELF Reference defines the WebTrends industry standard log file exchange format. Any firewall or VPN system logging to this format will be compatible with Firewall Suite 2.0 and later, Firewall Reporting Center 1.0 and later, and Security Reporting Center 2.0 and later. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;WebMarshal 6.X and WebMarshal 7.X&lt;/strong&gt; "Traffic Logging" logs can be created in the WELF format. &lt;/p&gt;&lt;ul&gt;    &lt;li&gt;For full details of the fields logged by WebMarshal, see LevelBlue Knowledgebase article &lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle21119.aspx" target="_blank" class="ApplyClass"&gt;Q21119&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Log File Format&lt;/h3&gt;&lt;p&gt;A log file is made up of records. Each record makes up a single line of the file. Records must be in chronological order. The earliest record is the first record in the file; the most recent record is the last record in the file. The WebTrends Enhanced Log Format places no restrictions on log file names or log file rotation policies. &lt;/p&gt;&lt;h3&gt;Record Format&lt;/h3&gt;&lt;p&gt;A record is terminated by the character sequence carriage return-line feed (0x0D-0x0A). There may be no carriage-returns or line-feeds within a record; this format results in a single record per line. &lt;/p&gt;&lt;p&gt;Each record is made up of fields. The record identifier field (id=) must be the first field in a record. All other fields can appear in any order. &lt;/p&gt;&lt;p&gt;Aside from a few &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Required%20Fields" class="solutionlink" target="_self"&gt;required fields&lt;/a&gt;, you can decide which &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Optional%20Fields" class="solutionlink" target="_self"&gt;optional fields&lt;/a&gt; are included in the record. You may want some fields to appear in only certain records because they are only relevant to certain types of activity (for example, the operation on an HTTP request). &lt;/p&gt;&lt;p&gt;Some optional fields may be left out if the firewall vendor chooses, but doing so typically results in reports that are less complete. Refer to the field descriptions to determine which fields are required for tables. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sample Record&lt;/strong&gt;&lt;br /&gt;(In a real log file, the record would reside on one line.) &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This sample record should give you a sense of what a record looks like. It does not contain all the fields that are available and described in this document. Additional &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Sample%20Records" class="solutionlink" target="_self"&gt;sample records&lt;/a&gt; are fully documented in the HELP Index built into the Firewall Suite product. &lt;/p&gt;&lt;p&gt;&lt;code&gt;id=firewall time="2000-2-4 12:01:01" fw=192.168.0.238 pri=6 rule=3 proto=http src=192.168.0.23 dst 6.1.0.36 rg=www.webtrends.com/index.html op=GET result 0 rcvd=1426&lt;/code&gt; &lt;/p&gt;&lt;p&gt;&lt;table cellspacing="0" cellpadding="5" width="500" border="1"&gt;    &lt;tbody&gt;        &lt;tr&gt;            &lt;td style="width: 50%;" valign="top"&gt;&lt;strong&gt;&lt;span style="font-size: 13px;"&gt;Required Fields&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;            &lt;td style="width: 50%;" valign="top"&gt;&lt;strong&gt;&lt;span style="font-size: 13px;"&gt;Optional Fields&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 50%;" valign="top"&gt;&lt;span style="font-size: 13px;"&gt;&lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Record%20identifier" class="solutionlink" target="_self"&gt;Record identifier&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Date/time" class="solutionlink" target="_self"&gt;Date/time&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Firewall%20IP%20address%20or%20name" class="solutionlink" target="_self"&gt;Firewall IP address or name&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Priority%20of%20the%20record" class="solutionlink" target="_self"&gt;Priority of the record&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;            &lt;td style="width: 50%;" valign="top"&gt;&lt;span style="font-size: 13px;"&gt;&lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Rule" class="solutionlink" target="_self"&gt;Rule&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Protocol" class="solutionlink" target="_self"&gt;Protocol&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Duration" class="solutionlink" target="_self"&gt;Duration&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Bytes%20Transferred" class="solutionlink" target="_self"&gt;Bytes Transferred&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Bytes%20Received" class="solutionlink" target="_self"&gt;Bytes Received&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Source" class="solutionlink" target="_self"&gt;Source&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Source%20Name" class="solutionlink" target="_self"&gt;Source Name&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Destination" class="solutionlink" target="_self"&gt;Destination&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Destination%20Name" class="solutionlink" target="_self"&gt;Destination Name&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#User" class="solutionlink" target="_self"&gt;User&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Operation" class="solutionlink" target="_self"&gt;Operation&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#URL%20Accessed" class="solutionlink" target="_self"&gt;URL Accessed&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Result%20Code" class="solutionlink" target="_self"&gt;Result Code&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#VPN" class="solutionlink" target="_self"&gt;VPN&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Type" class="solutionlink" target="_self"&gt;Type&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Message" class="solutionlink" target="_self"&gt;Message&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Referring%20Site" class="solutionlink" target="_self"&gt;Referring Site&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Agent" class="solutionlink" target="_self"&gt;Agent&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Category" class="solutionlink" target="_self"&gt;Category&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Category%20Action" class="solutionlink" target="_self"&gt;Category Action &lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#WMCache"&gt;WebMarshal Cache Result&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#WMClass"&gt;WebMarshal Classification&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;        &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;h3&gt;&lt;a name="Required Fields" target="_blank"&gt;Required Fields&lt;/a&gt; (WELF) &lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Record identifier" target="_blank"&gt;Record identifier&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The id= field identifies the type of record. For log files conforming to this document, the type will always be firewall. For example,    &lt;p&gt;&lt;code&gt;id=firewall&lt;/code&gt; &lt;/p&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Date/time" target="_blank"&gt;Date/time&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The time= field shows the date and time of the event, in terms of local time. The form of the date/time field is shown below (Note: Since this field contains spaces, it must be enclosed in double quotes):    &lt;p&gt;&lt;code&gt;time="yyyy-mm-dd hh:mm:ss"&lt;/code&gt; (where): &lt;/p&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;yyyy: year (always 4 digits)&lt;br /&gt;mm: number between 1 and 12 (inclusive) to represent the month (1 or 2 digits)&lt;br /&gt;dd: day of the month, 1 based (1 or 2 digits)&lt;br /&gt;hh: hour, based on 24-hour clock (1 or 2 digits)&lt;br /&gt;mm: minute (1 or 2 digits)&lt;br /&gt;ss: second (1 or 2 digits) &lt;/p&gt;&lt;p&gt;For example, &lt;/p&gt;&lt;p&gt;6:00 a.m. on January 1, 2000 would be represented as:&lt;br /&gt;time="2000-1-1 6:0:0" &lt;/p&gt;&lt;p&gt;It could also be represented as:&lt;br /&gt;time="2000-01-01 06:00:00" &lt;/p&gt;&lt;p&gt;6:00 p.m. on the same day would be represented as:&lt;br /&gt;time="2000-01-01 18:00:00" &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Firewall IP address or name" target="_blank"&gt;Firewall IP address or name&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The fw= field identifies the firewall that generated the log record. This is most often represented as an IP address or a machine name. Firewall Suite uses this field for licensing. The user's licensing is simplified if the firewall is consistent in logging this field. In other words, a particular firewall should always log its IP address or always log its machine name, but not both. If a firewall is logging its IP address, it should always log the IP address of the internal network interface or always log the IP address of the external network interface, not a mixture of the two.    &lt;p&gt;An example using the IP address of the firewall:&lt;br /&gt;    &lt;code&gt;fw=192.168.0.238&lt;/code&gt; &lt;/p&gt;    &lt;p&gt;An example using the machine name of the firewall:&lt;br /&gt;    &lt;code&gt;fw=ACME_FIREWALL&lt;/code&gt; &lt;/p&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Priority of the record" target="_blank"&gt;Priority of the record&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The pri= field specifies the priority of the event. The following is a list of valid values: &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;0 - emergency&lt;br /&gt;1 - alert&lt;br /&gt;2 - critical&lt;br /&gt;3 - error&lt;br /&gt;4 - warning&lt;br /&gt;5 - notice&lt;br /&gt;6 - information&lt;br /&gt;7 - debug &lt;/p&gt;&lt;p&gt;Messages are placed in various tables based on the priority. Messages with priorities 0, 1, and 2 are included in the critical errors tables, messages with priorities of 3 and 4 are included in the errors and warnings tables, and messages with priorities of 5, 6, and 7 are included in the informational messages tables. For example: &lt;/p&gt;&lt;p&gt;&lt;code&gt;pri=0&lt;br /&gt;pri=5&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;h3&gt;&lt;a name="Optional Fields" target="_blank"&gt;Optional Fields&lt;/a&gt; (WELF) &lt;/h3&gt;&lt;p&gt;The following fields for the WebTrends Enhanced Log File Format are optional: &lt;/p&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Rule" target="_blank"&gt;Rule&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The rule= field specifies the rule that triggered the log entry. This field is used to generate tables that help the user understand that the rules they have set up are working properly. Three tables are based on the rule field: internal IP addresses triggering firewall rules, external IP addresses triggering firewall rules, and protocols triggering firewall rules. Most firewalls log this field as an integer identifying a particular rule. However, rules could also be identified by name and logged as such in this field. For example: &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;&lt;code&gt;rule=4&lt;br /&gt;rule=12 &lt;/code&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Protocol" target="_blank"&gt;Protocol&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The proto= fields specifies the protocol used by the event. A large number of tables and graphs depend on the presence of the protocol field. Although this it is not a required field, without it, reports lack important information. Some firewalls do not log the protocol, but log the service. If this is the case, the service can be logged in this field. For example,    &lt;p&gt;&lt;code&gt;proto=http&lt;br /&gt;    proto=ftp&lt;br /&gt;    proto=snmp&lt;br /&gt;    &lt;/code&gt;&lt;br /&gt;    &lt;strong&gt;Default protocol mapping&lt;/strong&gt;&lt;br /&gt;    Firewall Suite includes a file called wtprotocols.txt that maps protocol fields found in log files to types of traffic that appear in reports (for example, pop3 in the log file is displayed as e-mail in the report). &lt;/p&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The following is an extract from the &lt;strong&gt;wtprotocols.txt&lt;/strong&gt; file that ships with WebTrends Firewall Suite:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;[web]&lt;br /&gt;http&lt;br /&gt;https&lt;br /&gt;80/tcp&lt;br /&gt;[email]&lt;br /&gt;pop3&lt;br /&gt;smtp&lt;br /&gt;smap&lt;br /&gt;[ftp]&lt;br /&gt;ftp&lt;br /&gt;ftp-data&lt;br /&gt;[telnet]&lt;br /&gt;telnet&lt;br /&gt;[realaudio]&lt;br /&gt;realaudio&lt;br /&gt;&lt;/code&gt;&lt;br /&gt;&lt;strong&gt;Map new protocols&lt;/strong&gt;&lt;br /&gt;Your log files may contain protocols not included in this file. Map them using the Protocols tab in the Firewall Options dialog in the GUI (a mapping changes file named protocols.txt is created). Or you can create the protocols.txt file and map new protocols. Follow the syntax of the wtprotocols.txt file: use the types of traffic designations enclosed in square brackets and list new protocols for that type of traffic, each on a single line. Note: Unmapped protocols are grouped for reports in a type of traffic designation called "other." &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Duration" target="_blank"&gt;Duration&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The duration= field specifies the time that is required to perform the operation, in seconds. For example, for an FTP file transfer, the duration is the amount of time used to perform the transfer. Although Firewall Suite tracks this field, it is not currently shown in any tables or graphs. We recommend that if the this information is available, it should be logged so that it can be used in the future. For example, to indicate that an operation required 3 minutes exactly, the duration field could look like this:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;duration=180.00&lt;br /&gt;&lt;/code&gt;&lt;br /&gt;or like this:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;duration=180&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Bytes Transferred" target="_blank"&gt;Bytes Transferred &lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The sent= field specifies the number of bytes transferred from the source to the destination. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;sent=1426&lt;br /&gt;sent=512&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Bytes Received" target="_blank"&gt;Bytes Received&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The rcvd= field specifies the number of bytes transferred from the destination to the source. For example:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;rcvd=1426&lt;br /&gt;rcvd=512&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Source" target="_blank"&gt;Source&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The src= field specifies the IP address that generated the event. For example:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;src=192.168.0.23&lt;br /&gt;src 6.0.2.1&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Source Name" target="_blank"&gt;Source Name&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The srcname= fields is a more user-friendly version of the src= field. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;srcname=mickm@example.com&lt;br /&gt;srcname=www.example.com&lt;br /&gt;srcname=JIMS_SYSTEM&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Destination" target="_blank"&gt;Destination&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The dst= field specifies the IP address that received the event. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;dst=192.168.0.23&lt;br /&gt;dst 6.0.2.1&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Destination Name" target="_blank"&gt;Destination Name&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The dstname= field is a more user-friendly version of the dst= field. For example, &lt;br /&gt;&lt;br /&gt;&lt;code&gt;dstname=EXAMPLE_SERVER&lt;br /&gt;dstname=www.example.com&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="User" target="_blank"&gt;User&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;If users are authenticating through the firewall, then the authenticated user name can be logged in the user= field. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;user=JohnB&lt;br /&gt;user=MarySmith&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Operation" target="_blank"&gt;Operation&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;For HTTP and FTP requests, the op= field is the operation such as GET, POST, etc. For example, &lt;br /&gt;&lt;br /&gt;&lt;code&gt;op=GET&lt;br /&gt;op=POST&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="URL Accessed" target="_blank"&gt;URL Accessed &lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;For HTTP and FTP requests, the arg= field is the URL accessed. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;arg=/PRODUCTS/GOODIES/GIFS/IWAWARD2.gif&lt;br /&gt;arg=/PRODUCTS/GOODIES/download.htm?Product=Standard&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Result Code" target="_blank"&gt;Result Code&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;For HTTP requests, the result= field is the standard result code, such as 200 for success, 304 for returned from cache, etc. For example, &lt;br /&gt;&lt;br /&gt;&lt;code&gt;arg 0&lt;br /&gt;arg=304&lt;br /&gt;arg=404&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="VPN" target="_blank"&gt;VPN&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The vpn= field identifies a particular VPN. This value is used to generate tables showing the most highly used VPNs and tables correlating particular users to particular VPNs. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;vpn="NY Branch VPN"&lt;br /&gt;vpn=Sales&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Type" target="_blank"&gt;Type&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The firewall vendor can use the type= field to cause records to be placed into the tables relating to VPN events or relating to firewall management events. (Other categories may be defined in the future.)&lt;br /&gt;A record can be put into more than one category by separating values by commas.&lt;br /&gt;The currently defined types are:&lt;br /&gt;&lt;br /&gt;· vpn - the record is a VPN event.&lt;br /&gt;&lt;br /&gt;· mgmt - the record is a firewall management event. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;type=vpn&lt;br /&gt;type=mgmt&lt;br /&gt;type=vpn,mgmt&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Message" target="_blank"&gt;Message&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The msg= field is the basis for the tables showing detailed Critical Events, Errors and Warnings, VPN events, and Firewall Management events. Firewall Suite generates summary tables showing these types of events. Firewall Suite will also generate detailed tables associating users with these events. To make this happen, the user(s) need to be identified using the Src=, Srcname=, Dst=, Dstname=, or User= fields. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;msg="VPN starting"&lt;br /&gt;msg="Possible port scan detected"&lt;br /&gt;msg="Firewall configuration changed"&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Referring Site" target="_blank"&gt;Referring Site&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;For incoming web records, the ref= field contains the referring site. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;ref=http://search.yahoo.com/bin/search?p=trends%20internet &lt;/code&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Agent" target="_blank"&gt;Agent&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;For incoming or outgoing web records, the agent= field contains the agent (usually the browser).&lt;br /&gt;&lt;br /&gt;&lt;code&gt;agent="SPRY_Mosaic/v8.32 (Windows 16-bit)"&lt;br /&gt;agent="Microsoft Internet Explorer/4.40.308 (Windows 95)"&lt;br /&gt;agent="Mozilla/3.0 (WinNT; I)"&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Category" target="_blank"&gt;Category&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The cat= field contains the categories to which the accessed site belongs. It is used only for firewalls or proxies capable of categorizing web sites. For example, www.msnbc.com might be categorized as "General News", "Investment", and "Entertainment". If a site belongs to more than one category, these categories should be given in the same cat= field, with a comma separating each category. Note: If a field contains spaces, it must be enclosed in double quotes.&lt;br /&gt;&lt;br /&gt;Use this field should only if dst= (or dstname=) is also present.&lt;br /&gt;For example:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;dst=www.msnbc.com cat=News&lt;br /&gt;dst=www.msnbc.com cat="General News"&lt;br /&gt;dst=www.msnbc.com cat=News,Investment,Entertainment&lt;br /&gt;dstname=www.msnbc.com cat=News,Investment,Entertainment&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Category Action" target="_blank"&gt;Category Action&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The cat_action= field contains the action taken for the category value of the cat= field. For example, access to gambling web sites may be blocked.&lt;br /&gt;This field should only be present if cat= is also present.&lt;br /&gt;Possible values for this field are: block and pass.&lt;br /&gt;For example:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;dst=www.gambling.com cat=Gambling cat_action=block&lt;br /&gt;dst=www.msnbc.com cat=News cat_action=pass&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="WMCache" target="_blank"&gt;WebMarshal Cache Result&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The wmcache= field contains the result of a WebMarshal cache lookup request.&lt;/p&gt;&lt;ul&gt;    &lt;li&gt;Cache status is not written for HTTPS or FTP requests. Only HTTP supports caching. &lt;/li&gt;    &lt;li&gt;This custom field cannot be reported by Security Reporting Center. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Possible values for this field are: &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;HIT&lt;/span&gt;, &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;MISS&lt;/span&gt;, &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;REFRESH_HIT&lt;/span&gt; or &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;REFRESH_MISS&lt;/span&gt;.&lt;/p&gt;&lt;ul&gt;    &lt;li&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;wmcache=HIT&lt;/span&gt; indicates that the item was served from cache without checking the origin server. &lt;/li&gt;    &lt;li&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;wmcache=MISS&lt;/span&gt; indicates that the item was not in cache and had to be retrieved from the origin server. &lt;/li&gt;    &lt;li&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;wmcache=REFRESH_HIT&lt;/span&gt; indicates that the cache item required revalidation, and that revalidation was successful. &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;&lt;/span&gt;&lt;/li&gt;    &lt;li&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;wmcache=REFRESH_MISS&lt;/span&gt; indicates that the cache item required revalidation, and that the origin server sent back new data. &lt;/li&gt;&lt;/ul&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="WMClass" target="_blank"&gt;WebMarshal Classification Result&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;Two fields record the result of WebMarshal classification:&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;dclass=&lt;/span&gt; indicates a WebMarshal Domain Classification&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;fclass=&lt;/span&gt; indicates a WebMarshal File Classification&lt;br /&gt;&lt;br /&gt;If WebMarshal records multiple classifications, they are included as a comma separated list within double quotes.&lt;br /&gt;&lt;br /&gt;For instance: &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;dclass="Safe Sites,Search Engines"&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;strong&gt;&lt;a name="Sample Records" target="_blank"&gt;Sample Records&lt;/a&gt;&lt;/strong&gt; &lt;/p&gt;&lt;p&gt;See the document entitled &lt;strong&gt;WebTrends Enhanced Log Format (WELF) For Firewalls &amp;amp; VPNs&lt;/strong&gt; or the HELP Index built into the Firewall Suite product for examples of records that conform to the WebTrends Enhanced Log File Format. Included among the examples provided are: &lt;/p&gt;&lt;ul&gt;    &lt;li&gt;Sample Web Records &lt;/li&gt;    &lt;li&gt;Sample E-mail Records &lt;/li&gt;    &lt;li&gt;Sample Telnet Records &lt;/li&gt;    &lt;li&gt;Sample FTP Records &lt;/li&gt;    &lt;li&gt;Sample RealAudio Records &lt;/li&gt;    &lt;li&gt;Sample Management Records &lt;/li&gt;    &lt;li&gt;Sample Error Messages &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;&lt;/em&gt;&lt;/p&gt;&lt;dl&gt;&lt;em&gt;    &lt;dt&gt;This article was previously published as: &lt;/dt&gt;    &lt;dd&gt;NETIQKB1301 &lt;/dd&gt;    &lt;/em&gt;&lt;/dl&gt;</description><pubDate>Wed, 06 Nov 2019 18:24:28 GMT</pubDate><dc:creator>Charles</dc:creator></item><item><title>Error: "java.lang.OutOfMemory"</title><link>https://support.levelblue.com/kb/Goto10137.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite 4.1x&lt;/LI&gt;&lt;LI&gt;Security Reporting Center 2.X&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Error: "java.lang.OutOfMemory" &lt;LI&gt;Out of memory errors are received when trying to view reports.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;The Java component does not allocating enough memory for reports with large amounts of data to load successfully. &lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;For the report to display successfully, allocate more memory to Java. To do this please follow the steps below: &lt;P&gt;&lt;B&gt;&lt;I&gt;Important Note!&lt;/I&gt;&lt;/B&gt; Before making any changes, please make a backup of your registry. &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;STRONG&gt;Allocating Java memory on Windows:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;P&gt;&lt;LI&gt;Open the Registry Editor by running the regedit command. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Navigate to the following entry: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services/NetIQTomcatService/Parameters&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Add two new strings: &lt;UL&gt;&lt;P&gt;&lt;LI&gt;JVM Option Number 2&lt;BR&gt;value: -Xms10M &lt;P&gt;&lt;/P&gt;&lt;LI&gt;JVM Option Number 3&lt;BR&gt;value: -Xmx500M &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Change the "JVM Option Count" parameter from 2 to 4, because we have added two new parameters. Without making this change, the memory will not be affected. &lt;BR&gt;&lt;LI&gt;Restart the NetIQ Apache and NetIQ Tomcat services in Service Control Manager.&lt;/LI&gt;&lt;/OL&gt;&lt;BLOCKQUOTE dir=ltr style="MARGIN-RIGHT: 0px"&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color=#ff0000&gt;Warning:&lt;/FONT&gt;&lt;/STRONG&gt; Using the Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Trustwave cannot guarantee that problems resulting from the incorrect use of Registry Editor can be resolved. Make sure that you backup your Registry prior to making any changes. &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB35391&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 03:23:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>How do I export Check Point log files?</title><link>https://support.levelblue.com/kb/Goto10346.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.x &lt;LI&gt;WebTrends Firewall Suite 4.x &lt;LI&gt;Check Point Firewall-1 &lt;LI&gt;Check Point NG&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I export Check Point log files? &lt;P&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Unable to analyze Check Point exported log files.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;&lt;B&gt;To export Check Point FW-1 log files, follow these steps.&lt;/B&gt; &lt;OL&gt;&lt;P&gt;&lt;LI&gt;From the machine on which the firewall is installed, access a command prompt. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Change to the directory where the &lt;CODE&gt;fw.exe&lt;/CODE&gt; file is located. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Enter the following text to export the &lt;CODE&gt;fw.log&lt;/CODE&gt; log files. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;fw logexport -d ; -i fw.log -o[log_path]\fw.log&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Enter the following text to export the &lt;CODE&gt;fw.alog&lt;/CODE&gt; log files. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;fw logexport -d ; i fw.alog -o [log_path]\fw.alog&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To export Check Point NG log files, follow these steps:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;P&gt;&lt;LI&gt;On the computer where the firewall is installed, open a command prompt. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Switch to the &lt;STRONG&gt;\winnt\fw1\NG\bin&lt;/STRONG&gt; directory where the &lt;CODE&gt;fw.exe&lt;/CODE&gt; file is located. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Export the log files using the following command: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;fwm logexport -i &amp;lt;input file&amp;gt; -o &amp;lt;output file&amp;gt;&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt; If you do not specify an input file Check Point exports the current log. &lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Check Point NG does not produce an &lt;FONT face="Courier New"&gt;.alog&lt;/FONT&gt; file.  This information is now combined into the regular &lt;FONT face="Courier New"&gt;.log&lt;/FONT&gt; file.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB5691&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 03:19:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>What is a UNC path?</title><link>https://support.levelblue.com/kb/Goto10870.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite 4.X&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;What is a UNC path? &lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;&lt;B&gt;UNC&lt;/B&gt; is short for &lt;B&gt;&lt;U&gt;U&lt;/U&gt;&lt;/B&gt;niversal &lt;B&gt;&lt;U&gt;N&lt;/U&gt;&lt;/B&gt;aming &lt;B&gt;&lt;U&gt;C&lt;/U&gt;&lt;/B&gt;onvention, a Windows format for specifying the location of resources on a local-area network (LAN). UNC uses the following format: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;\\server-name\shared-resource-pathname&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The shared resource pathname can be a single name, or a longer directory path. It can mount at any point on a logical drive (not necessarily at the root of the drive).&lt;BR&gt;&lt;/P&gt;&lt;P&gt;&lt;B&gt;What is UNC?&lt;/B&gt;&lt;BR&gt;&lt;P&gt;View a definition provided by Microsoft:&lt;BR&gt;&lt;A class=solutionlink href="http://msdn.microsoft.com/library/officedev/off2000/idh_ofdefuniversalnamingconventionunc.htm" target=_blank&gt;http://msdn.microsoft.com/library/officedev/off2000/idh_ofdefuniversalnamingconventionunc.htm&lt;/A&gt; &lt;P&gt;View definitions from Google:&lt;BR&gt;&lt;A href="http://www.google.com/search?hl=en&amp;amp;q=define%3AUNC"&gt;http://www.google.com/search?hl=en&amp;amp;q=define%3AUNC&lt;/A&gt;  &lt;P&gt;&lt;I&gt;&lt;/P&gt;&lt;P&gt;This article was previously published as: &lt;/P&gt;&lt;DL&gt;&lt;DD&gt;NETIQKB2474&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Mon, 12 May 2008 01:11:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>Is the Check Point Safe@Office device supported?</title><link>https://support.levelblue.com/kb/Goto10598.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite 4.x &lt;LI&gt;Security Reporting Center 2.x&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;Is the Check Point Safe@Office device supported? &lt;P&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;Unfortunately this device has not been quality tested so Marshal cannot support it at this time.&lt;/P&gt;&lt;P&gt;For a list of our supported devices please see the following Trustwave Knowledgebase article:&lt;/P&gt;&lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/Article.aspx?id=10939" target=_blank&gt;Q10939&lt;/A&gt;: Which firewalls are supported?&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB40278&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Mon, 29 Oct 2007 20:40:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>How do I continue logging when Check Point Firewall log files need to be rotated?</title><link>https://support.levelblue.com/kb/Goto10305.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I continue logging when Check Point Firewall log files need to be rotated? &lt;P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;When rotating the log file for a Check Point firewall, below are the proper steps to follow. &lt;OL&gt;&lt;LI&gt;Stop the LEA Server service. &lt;LI&gt;Delete the &lt;CODE&gt;lastrecord.txt&lt;/CODE&gt; files in the log file directory, located below: &lt;UL&gt;&lt;P&gt;&lt;CODE&gt;&amp;lt;Installation Directory&amp;gt;\LeaCache\x_x_x_x.dat&lt;/CODE&gt; &lt;P&gt;[where &lt;CODE&gt;x_x_x_x&lt;/CODE&gt; is the internal IP for the firewall] &lt;P&gt;During the configuration of the LEA Service or when configuring the profile that utilizes this service the log file location can be configured to use a location other than the default location above. If this option was used, remove the lastrecord.txt files from the location specified in the custom configuration. &lt;P&gt;&lt;B&gt;&lt;I&gt;Note:&lt;/I&gt;&lt;/B&gt; There will always be a &lt;CODE&gt;lastrecord.txt&lt;/CODE&gt; file, and there may be a second file with a name beginning with "lastrecord" if the log files are being logged.&lt;BR&gt;&lt;/P&gt;&lt;/UL&gt;&lt;LI&gt;Rotate the log file on the Check Point firewall. &lt;LI&gt;Start the LEA Server service. &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;When Firewall Suite retrieves log file information via the LEA connection with a Check Point Firewall, the last record received in a file called &lt;CODE&gt;lastrecord.txt&lt;/CODE&gt; is always kept. When the log file is rotated on the Check Point Firewall, this record will not be present in the new log file, and the retrieval process will not be able to retrieve new information, as it does not know where it left off. By deleting the &lt;CODE&gt;lastrecord.txt&lt;/CODE&gt; file, and by restarting our LEA service, the data retrieval process can be reset to properly receive data from a newly created log file. &lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB1619&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 20 Sep 2007 03:26:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>How do I determine if a Cisco Pix log file is in the 6.2 format?</title><link>https://support.levelblue.com/kb/Goto10331.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.x &lt;LI&gt;WebTrends Firewall Suite 4.1x &lt;LI&gt;Cisco Pix 6.2&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I determine if a Cisco Pix log file is in the 6.2 format? &lt;P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;If the log contains entries similar to "from inside:10.x.x.x/3338 to outside:10.x.x.x", then it is in 6.2 format.  A sample of information from a Cisco Pix 6.2 log file looks like this:&lt;/P&gt;&lt;P&gt;&lt;TABLE width=1600&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;CODE&gt;WTsyslog[2002-04-04 10:20:35 ip=10.0.0.1 pri=6] &amp;lt;166&amp;gt;%PIX-6-305011: Built dynamic TCP translation from inside:127.0.0.1/1111 to outside:1.1.1.1/1026&lt;BR&gt;WTsyslog[2002-04-04 10:20:35 ip=10.0.0.1 pri=6] &amp;lt;166&amp;gt;%PIX-6-302013: Built outbound TCP connection 3 for outside:127.0.0.1/80 (64.28.67.114/80) to inside:1.1.1.1/1026(172.16.0.200/1026)&lt;BR&gt;WTsyslog[2002-04-04 10:20:35 ip=10.0.0.1 pri=6] &amp;lt;166&amp;gt;%PIX-6-305011: Built dynamic TCP translation from inside:127.0.0.1/1111 to outside:1.1.1.1/1026&lt;BR&gt;WTsyslog[2002-04-04 10:20:35 ip=10.0.0.1 pri=6] &amp;lt;166&amp;gt;%PIX-6-302013: Built outbound TCP connection 4 for outside:127.0.0.1/80 (64.28.67.57/80) to inside:1.1.1.1/1026 (172.16.0.200/1027)&lt;BR&gt;WTsyslog[2002-04-04 10:20:35 ip=10.0.0.1 pri=6] &amp;lt;166&amp;gt;%PIX-6-305011: Built dynamic TCP translation from inside:127.0.0.1/443 to outside:1.1.1.1/1026&lt;BR&gt;WTsyslog[2002-04-04 10:20:35 ip=10.0.0.1 pri=6] &amp;lt;166&amp;gt;%PIX-6-302013: Built outbound TCP connection 5 for outside:127.0.0.1/443 (64.28.67.57/80) to inside:1.1.1.1/1026 (172.16.0.200/1028)&lt;BR&gt;WTsyslog[2002-04-04 10:20:35 ip=10.0.0.1 pri=6] &amp;lt;166&amp;gt;%PIX-6-305011: Built dynamic TCP translation from inside:127.0.0.1/1111 to outside:1.1.1.1/1026 &lt;/CODE&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;BR&gt;&lt;BR&gt;&lt;H2&gt;Notes: &lt;/H2&gt;&lt;P&gt;To run reports for Cisco Pix 6.2 log files, please install Firewall Suite 4.1c.  If you are using 4.1a, please apply the patch noted in the following knowledge base article: &lt;P&gt;&lt;A href="https://support.levelblue.com/kb/article.aspx?id=10450"&gt;Q10450&lt;/A&gt;: How do I run reports for a Cisco Pix 6.2/6.3 log file?&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB12761&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 02 May 2007 03:48:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>How do I specify several days of log files in the log file path, using date macros with a pipe (|) character?</title><link>https://support.levelblue.com/kb/Goto10478.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite 4.X&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I specify several days of log files in the log file path, using date macros with a pipe (|) character? &lt;P&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Some daily reports are missing. &lt;LI&gt;Profile is configured to analyze yesterday's log file, and analyzes once each day.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;When a profile is configured to access yesterday's log file via FTP, and if the FTP client is unsuccessful in accessing that log file, a result could be 'missing days' in your WebTrends reports. &lt;P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;To avoid 'missing days' in your reports, the profile can be configured to access multiple days. Therefore, if for some reason the FTP client is unsuccessful today in accessing yesterday's log file, tomorrow it can attempt again to access the log file it missed in addition to the current log file. &lt;P&gt;Date macros can be used in the log file path within the profile configuration. For example, your log file name for today's log file is &lt;CODE&gt;ex20020615.exe&lt;/CODE&gt; (year 02, month=Feb., and day=15). The following string can be used to retrieve log files for multiple days. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;&lt;CODE&gt;ftp://www.domain.com/logs/ex%date-1%%yyyy%%mm%%dd%.log&lt;/CODE&gt; | &lt;CODE&gt;ftp://www.domain.com/logs/ex%date-2%%yyyy%%mm%%dd%.log&lt;/CODE&gt; | &lt;CODE&gt;ftp://www.domain.com/logs/ex%date-3%%yyyy%%mm%%dd%.log&lt;/CODE&gt; &lt;/CODE&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;With this type of configuration, each time the analysis begins, three days of log files are accessed. So, if for some reason the FTP client is unsuccessful today in accessing the log files, most likely they will be accessed the following day.&lt;/P&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;To review further information about date macros that can be used in Firewall Suite, please review the following knowledge base article. &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/article.aspx?id=10272"&gt;Q10272&lt;/A&gt;: How do I configure date macros?&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB4680&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 02 May 2007 03:40:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>Error: 'The Word report converter requires Microsoft Office 2000 or better. A search of the system registry failed to locate the required version of Office.'</title><link>https://support.levelblue.com/kb/Goto10115.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.1 &lt;LI&gt;Firewall Suite 4.1x&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Error: 'The Word report converter requires Microsoft Office 2000 or better. A search of the system registry failed to locate the required version of Office.' &lt;LI&gt;Error occurs when using the Document Utility with Microsoft Word 2003.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;The Document Utility distributed with the product versions named above does not support Microsoft Office 2003. &lt;P&gt;&lt;P&gt;&lt;H2&gt;Resolution:&lt;/H2&gt;Microsoft Word 2003 is supported by the latest version of Document Conversion Utility. You can obtain the latest version of Document Conversion Utility as a standalone installation from the &lt;A href="https://support.levelblue.com/Security-Reporting-Center/"&gt;Security Reporting Center Support&lt;/A&gt; page.&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB45132&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 14 Mar 2007 01:49:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Which firewalls are supported?</title><link>https://support.levelblue.com/kb/Goto10939.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite 4.1x &lt;LI&gt;Security Reporting 2.x&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Which firewalls are supported?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;Marshal Firewall Reporting products are compatible with the following systems. Please refer to the specific product documentation for configuration information.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SRC&lt;/STRONG&gt;=Security Reporting Center&lt;BR&gt;&lt;STRONG&gt;FWS&lt;/STRONG&gt;=Firewall Suite &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;TABLE cellSpacing=1 cellPadding=4 width="85%" border=1&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD class=standTableHeader width="30%"&gt;&lt;STRONG&gt;Company name&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class=standTableHeader width="30%"&gt;&lt;STRONG&gt;Device/Version (Versions up to)&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class=standTableHeader width="10%"&gt;&lt;STRONG&gt;WELF Certified&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD class=standTableHeader width="30%"&gt;&lt;STRONG&gt;Works with...&lt;/STRONG&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell rowSpan=4&gt;3Com&lt;/TD&gt;&lt;TD class=standTableCell&gt;OfficeConnect Internet Firewall 25 v4.1.0, 5.x&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;OfficeConnect Firewall DMZ v4.1.0, 5.x&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;SuperStack 3 Firewall v5.x&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;SuperStack 3 WebCache 1000/3000 v2.0&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;ARKOON Network Security&lt;/TD&gt;&lt;TD class=standTableCell&gt;ARKOON 2.20&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Aventail&lt;/TD&gt;&lt;TD class=standTableCell&gt;Extranet Center v3.0&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;BorderWare&lt;/TD&gt;&lt;TD class=standTableCell&gt;BorderWare Firewall Server v5.0&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;CacheFlow&lt;/TD&gt;&lt;TD class=standTableCell&gt;600, 6000, 700, 7000&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt; &lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Clavister&lt;/TD&gt;&lt;TD class=standTableCell&gt;Clavister Firewall&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Check Point&lt;/TD&gt;&lt;TD class=standTableCell&gt;VPN-1/FireWall-1 v4.0 (including NG) &lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Cimcor&lt;/TD&gt;&lt;TD class=standTableCell&gt;CimTrak Web Security Edition 1.3&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell rowSpan=3&gt;Cisco Systems&lt;/TD&gt;&lt;TD class=standTableCell&gt;Pix Secure Firewall v4.x, 5.x, 6.x&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;IOS Firewall Feature Set v11.3, 12.1&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Cache Engine v2.01&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;CyberGuard&lt;/TD&gt;&lt;TD class=standTableCell&gt;CyberGuard Firewall v4.1, 4.2, 4.3, 5.1&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Fortinet&lt;/TD&gt;&lt;TD class=standTableCell&gt;FortiGate family v2.26&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Global Technologies&lt;/TD&gt;&lt;TD class=standTableCell&gt;Gnatbox (GB-1000) 3.3.0+&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Ingate&lt;/TD&gt;&lt;TD class=standTableCell&gt;Ingate firewall: 1200, 1400, 1800/1880&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Inktomi&lt;/TD&gt;&lt;TD class=standTableCell&gt;Traffic Server, C—Class and E—Class&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Internet Dynamics&lt;/TD&gt;&lt;TD class=standTableCell&gt;Conclave Firewall v1.52x, 2.x&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Lucent&lt;/TD&gt;&lt;TD class=standTableCell&gt;Security Management Server V. 6.0.471&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell rowSpan=2&gt;Microsoft&lt;/TD&gt;&lt;TD class=standTableCell&gt;ISA Server 2000&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Proxy Server v2.x&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Netasq&lt;/TD&gt;&lt;TD class=standTableCell&gt;F10, F100 v3.x&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Netopia&lt;/TD&gt;&lt;TD class=standTableCell&gt;S9500 Security Appliance v1.6&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Netscape&lt;/TD&gt;&lt;TD class=standTableCell&gt;Netscape Proxy Server v1.x, 2.x, 3.x&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;NetScreen&lt;/TD&gt;&lt;TD class=standTableCell&gt;Neoteris Access IVE&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell rowSpan=2&gt;Network-1&lt;/TD&gt;&lt;TD class=standTableCell&gt;CyberwallPLUS-WS&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;CyberwallPLUS-SV&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Network Appliance&lt;/TD&gt;&lt;TD class=standTableCell&gt;NetCache v3.3&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Novell&lt;/TD&gt;&lt;TD class=standTableCell&gt;BorderManager v2.x and 3.x&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;RapidStream&lt;/TD&gt;&lt;TD class=standTableCell&gt;All Models&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Recourse Technologies&lt;/TD&gt;&lt;TD class=standTableCell&gt;ManHunt v1.2, 1.21&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;St. Bernard Software&lt;/TD&gt;&lt;TD class=standTableCell&gt;iPrism 3.2&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell rowSpan=3&gt;Secure Computing&lt;/TD&gt;&lt;TD class=standTableCell&gt;Sidewinder v5.x&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Gauntlet Firewall for Unix v4.x&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Gauntlet Firewall for NT v2.x, 5.x&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;SecureSoft&lt;/TD&gt;&lt;TD class=standTableCell&gt;SUHOSHIN v2.0 and 3.0&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;SonicWALL&lt;/TD&gt;&lt;TD class=standTableCell&gt;TELE, SOHO, PRO, GX v4.10, 5.x, 6.x&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS &lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Squid Project&lt;/TD&gt;&lt;TD class=standTableCell&gt;Squid Internet Object Cache v1.1, 2.x&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Sun Microsystems&lt;/TD&gt;&lt;TD class=standTableCell&gt;SunScreen Firewall v3.1&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell rowSpan=2&gt;Symantec&lt;/TD&gt;&lt;TD class=standTableCell&gt;Raptor, VelociRaptor v5.x, 6.x, Enterprise FireWall v6.5&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Raptor Eagle v3.x, 4.x&lt;/TD&gt;&lt;TD class=standTableCell&gt;&lt;BR&gt;&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;Top Layer&lt;/TD&gt;&lt;TD class=standTableCell&gt;AS 3500&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD class=standTableCell&gt;WatchGuard&lt;/TD&gt;&lt;TD class=standTableCell&gt;All Firebox Models v2.x, 3.x, 4.x, 5.x&lt;/TD&gt;&lt;TD class=standTableCell align=middle&gt;Yes&lt;/TD&gt;&lt;TD class=standTableCell&gt;SRC, FWS &lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/Article.aspx?id=10939#" target=_blank&gt;&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB37051&lt;/DD&gt;&lt;DD&gt;NETIQKB1963&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Mon, 08 May 2006 23:26:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>How does the Syslog Service work?</title><link>https://support.levelblue.com/kb/Goto10558.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How does the Syslog Service work?&lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;The purpose of the Syslog Service is to make firewall log files accessible to the Firewall Suite machine.  The Syslog daemon of the Firewall Suite Syslog Service collects firewall log data from the firewall via UDP 514.  The daemon collects the firewall data and creates a log file on the machine running WebTrends where they will remain until the user deletes them. &lt;P&gt;The Syslog Service standardizes the prefix of the firewall log file records. In the following example, the part of the firewall record that is formatted by Syslog Service appears in bold. &lt;P&gt;&lt;CODE&gt;&lt;B&gt;WTsyslog [2001-11-01 00:31:41 ip=192.168.9.1 pri=6]&lt;/B&gt; 304001 192.168.10.20 accessed URL 192.9.24.116:template/sunstyle.css&lt;/CODE&gt; &lt;P&gt;To verify that data is streaming to the Firewall Suite machine, click &lt;B&gt;Tools&lt;/B&gt; | &lt;B&gt;Monitor LEA/Syslog&lt;/B&gt;.  The program will find any traffic being collected by the WebTrends machine and display it in a small window. &lt;P&gt;If data is appearing in the syslog viewer but not being written to a log file, then the IP address specified in the "Firewall IP address" field in the profile editor is incorrect. Firewall Suite checks each syslog packet received for its originator and tries to match this to the Firewall IP address. This enables you to include data from more than one firewall in your report using syslog servers.  By looking at these packets and comparing their IP addresses, Firewall Suite can tell which syslog data packet belongs to which firewall.&lt;/P&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;The firewall must be configured to use the Syslog Service.  Please refer to the Firewall Configuration Guide for instruction. The guide can be found on the following Documentation page: &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/Firewall-Suite/Documentation.asp" target=_blank&gt;https://support.levelblue.com/Firewall-Suite/Documentation.asp&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Because the Syslog Service runs as a Windows service, you must run Firewall Suite on a Windows NT, Windows 2000, Windows 2003, or Windows XP system and you must have administrator rights to configure the application to run as a service.&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as:&lt;DD&gt;NETIQKB7128&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 13 Apr 2006 03:56:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Zeros for kilobytes transferred result in report on Check Point firewall.</title><link>https://support.levelblue.com/kb/Goto10971.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite&lt;LI&gt;Check Point NG&lt;LI&gt;Check Point VPN-1/FireWall-1&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Zeros for kilobytes transferred result in firewall report.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;Bandwidth information is not being captured within the regular log file. This information is logged in the accounting log files.&lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;If you are analyzing log files from a Check Point Firewall, make sure you are generating both the regular and accounting log files. &lt;P&gt;The regular log file contains information regarding your firewall activity, while the accounting log file contains the bandwidth and duration information. WebTrends uses this accounting log file information to report the kilobytes transferred. Make sure the account log files are being generated. &lt;P&gt;Please refer to the Firewall Configuration Guide for instructions on how to configure your firewall to create the accounting log file. &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/Firewall-Suite/Documentation.asp" target=_blank&gt;https://support.levelblue.com/Firewall-Suite/Documentation.asp&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as:&lt;DD&gt;NETIQKB7305&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 13 Apr 2006 03:50:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>How do I create a profile for my Network Appliance NetCache log files?</title><link>https://support.levelblue.com/kb/Goto10311.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite&lt;LI&gt;Network Appliance NetCache 3.3&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I create a profile for my Network Appliance NetCache log files?&lt;P&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;'Network Appliance NetCache' is not available in the list of log file formats when creating a profile in the 'General Activity' cartridge.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;The log created by Network Appliance NetCache is in "Squid" format. Since the information captured in the log file only contains inbound and outbound activity, the only cartridges that will analyze the log files successfully are the "Incoming Firewall Activity" and "Outgoing Firewall Activity" cartridges.&lt;P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;Follow these steps to configure a profile to analyze Network Appliance NetCache log files. &lt;BR&gt;&lt;BR&gt;&lt;OL&gt;&lt;P&gt;&lt;LI&gt;From the main console, select either the &lt;B&gt;Outgoing Firewall Activity&lt;/B&gt; or &lt;B&gt;Incoming Firewall Activity&lt;/B&gt; cartridge. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Click the &lt;B&gt;New Profile&lt;/B&gt; link in the left menu. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;A new dialog opens. Select whether you firewall resides on a single physical machine or on multiple machines, and click &lt;B&gt;Next&lt;/B&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Enter a &lt;B&gt;Description&lt;/B&gt; of the profile in the text box provided. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;From the &lt;B&gt;Log File Format&lt;/B&gt; drop-down menu, select &lt;B&gt;Network Appliance NetCache Log File (Squid)&lt;/B&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Continue with the remaining requests for information until the profile configuration is complete. &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as:&lt;DD&gt;NETIQKB8986&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 13 Apr 2006 03:46:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Error: SNMP agent failed to start because wtagent.dll is missing or unconfigured.</title><link>https://support.levelblue.com/kb/Goto10152.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite 4.X&lt;LI&gt;Windows NT 4.0&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Error: SNMP agent failed to start because wtagent.dll is missing or unconfigured.&lt;LI&gt;SNMP agent failed to start.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Changes Made:&lt;/H2&gt;This occurs on a new install of Windows NT or if you have recently installed any Microsoft software of srervice pack.&lt;P&gt;&lt;H2&gt;Causes:&lt;/H2&gt;The wtagent.dll is missing or is not configured.&lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;Follow these steps to resolve the error: &lt;OL&gt;&lt;P&gt;&lt;LI&gt;First, verify that the SNMP service is installed. &lt;UL&gt;&lt;LI&gt;To do this, right click &lt;B&gt;Network Neighborhood&lt;/B&gt; and choose &lt;B&gt;Properties&lt;/B&gt;. &lt;LI&gt;You will see a &lt;B&gt;Services&lt;/B&gt; tab (this is not the same services from control panel). &lt;LI&gt;Verify that SNMP is listed. If not, you will need to choose &lt;B&gt;Add&lt;/B&gt; and install it. &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Once you have verified that SNMP is installed, re-install the Windows NT Service Pack that was currently installed. Even if SNMP was installed, you must re-install the service pack.  &lt;P&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;When you see the &lt;B&gt;SNMP agent failed to start because wtagent.dll is missing or unconfigured&lt;/B&gt; error, it is almost always because of the above reasons. &lt;/P&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as:&lt;DD&gt;NETIQKB1350&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 13 Apr 2006 03:43:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>How do I create a report which includes activity from a single IP address or computer name?</title><link>https://support.levelblue.com/kb/Goto10313.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite 4.X&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I create a report which includes activity from a single IP address or computer name?&lt;P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;If you wish to create a report, which includes activity from a single IP address or computer name, complete the following steps. &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Determine the IP address of the activity you wish to include. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Edit an existing profile or a new one may be created. Within that profile, access the &lt;B&gt;Filters&lt;/B&gt; tab. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Delete the &lt;B&gt;Include Everything&lt;/B&gt; filter. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Create a new &lt;B&gt;Include&lt;/B&gt; filter and enter a meaningful description. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Select &lt;B&gt;Include Activity Based Upon&lt;/B&gt; and check &lt;STRONG&gt;Users(IP)&lt;/STRONG&gt; or &lt;STRONG&gt;Internal User Address &lt;/STRONG&gt;or &lt;STRONG&gt;External User Address.&lt;/STRONG&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Select &lt;B&gt;Next&lt;/B&gt;.   &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Enter the IP address or computer name (Fully Qualilfied Domain Name or FQDN, such as machine.example.com) of the specific user, and then select &lt;B&gt;Next&lt;/B&gt;, followed by &lt;B&gt;Finish&lt;/B&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;If a new profile is being created, complete the creation, or if an existing profile is being edited, save the profile and start the analysis of the log file. &lt;/LI&gt;&lt;/OL&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;Different types of ranges can be entered for this filter.  For example: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;204.245.240.0-63&lt;/CODE&gt;&lt;BR&gt;Specifies all numeric IP addresses from 204.245.240.0 through 204.245.240.63 &lt;P&gt;&lt;CODE&gt;204.245.240.0-204.245.240.64&lt;/CODE&gt;&lt;BR&gt;Specifies all numeric IP addresses from 204.245.240.0 through 204.245.240.64 &lt;P&gt;&lt;CODE&gt;204.245.240.64/26&lt;/CODE&gt;&lt;BR&gt;CIDR notation.  Specifies all addresses of this classless subnet: 204.245.240.64 - 204.245.240.127. &lt;P&gt;&lt;CODE&gt;111.92.76.0/26&lt;/CODE&gt;&lt;BR&gt;CIDR notation.  Specifies all subnet addresses from 111.92.76.0 through 111.92.76.63. &lt;P&gt;&lt;CODE&gt;*.WebTrends.com&lt;/CODE&gt;&lt;BR&gt;Specifies only those addresses that have a sub-domain that appears to the left of this domain (such as., www.WebTrends.com, ftp.WebTrends.com, etc.) This would not include addresses without a sub-domain. &lt;P&gt;&lt;CODE&gt;*WebTrends.com&lt;/CODE&gt;&lt;BR&gt;Any address that includes the specified domain, with or without a sub-domain  (such as., www.WebTrends.com, ftp.WebTrends.com, or WebTrends.com). &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;For &lt;B&gt;General Firewall Activity&lt;/B&gt; reports, the &lt;B&gt;Users IP&lt;/B&gt; option is not available when creating a filter.  Instead, it can either be specified as an &lt;B&gt;Internal User Address&lt;/B&gt; or &lt;B&gt;External User Address&lt;/B&gt;.&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as:&lt;DD&gt;NETIQKB3892&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 13 Apr 2006 03:39:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>IP addresses are listed under Top Sites in Core Categories.</title><link>https://support.levelblue.com/kb/Goto10591.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;WebTrends Firewall Suite 4.1+&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;IP addresses are listed under Top Sites in Core Categories.&lt;LI&gt;'Do not categorize IPs' is checked in the Advanced URL Categorization options.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;There are several factors that can influence what information is reported.  Checking or unchecking this option, as well as if the profile uses either "quick mode" or "resolve mode" for DNS resolution, can influence results.  &lt;UL&gt;&lt;P&gt;&lt;LI&gt;&lt;B&gt;If 'Do Not Categorize IPs' is not checked (default setting) then the following will occur.&lt;/B&gt; &lt;P&gt;&lt;TABLE cellSpacing=0 cellPadding=3 width=600 border=2&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;IP address in firewall log file&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;DNS look-up resolves to host name&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Host name used by SurfControl to categorize site&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;IP address in firewall log file&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;DNS look-up resolves to host name&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;The original IP is used by SurfControl to categorize site, but the resolved name is displayed in the report &lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;IP address in firewall log file &lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;No DNS look-up (quickmode) or IP is unresolvable&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;IP address used by SurfControl to categorize site&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;&lt;B&gt;If 'Do Not Categorize IPs' is checked, then the following will occur.&lt;/B&gt; &lt;P&gt;&lt;TABLE cellSpacing=0 cellPadding=3 width=600 border=2&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;IP address in firewall log file&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;DNS look-up resolves to host name&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Host name used by SurfControl to categorize site&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;IP address in firewall log file &lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;DNS look-up resolves to a host name not contained in the SurfControl database&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;No categorization occurs&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;IP address in firewall log file &lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;No DNS look-up (quick mode) or IP is unresolvable&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;IP address used by SurfControl to categorize site&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as:&lt;DD&gt;NETIQKB9452&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 13 Apr 2006 03:32:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>How do I configure Check Point NG to produce log files Firewall Suite can analyze?</title><link>https://support.levelblue.com/kb/Goto10271.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I configure Check Point NG to produce log files Firewall Suite can analyze?&lt;P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;To create logs that can be read by Firewall Suite, Check Point NG firewalls require additional configuration beyond that required by the Firewall-1 product from Check Point. The latest version of the Firewall Configuration Guide contains information for Check Point NG. You can obtain this document from the following page:&lt;P&gt;&lt;A href="https://support.levelblue.com/Firewall-Suite/documentation.asp"&gt;https://support.levelblue.com/Firewall-Suite/documentation.asp&lt;/A&gt; &lt;P&gt;For your convenience the additional information is repeated below.&lt;/P&gt;&lt;H3&gt;Instructions:&lt;/H3&gt;&lt;P&gt;Perform the following steps at the end of the "OPSEC LEA (server-side configuration)". &lt;P&gt;&lt;B&gt;Server-side configuration for Check Point NG&lt;/B&gt; &lt;P&gt;Check Point NG requires the following additional configuration for retrieval of log records via OPSEC LEA. &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Edit the file &lt;CODE&gt;fwopsec.conf&lt;/CODE&gt;, found in &lt;CODE&gt;%NG_INSTALL_DIR%/conf/&lt;/CODE&gt;. Delete the following lines. &lt;UL&gt;&lt;P&gt;&lt;CODE&gt;lea_server auth_port 18184 lea_server port 0 &lt;/CODE&gt;&lt;/P&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Replace with the following lines, appended to the bottom of the file. &lt;UL&gt;&lt;P&gt;&lt;CODE&gt;lea_server auth_port 0 lea_server port 18184 &lt;/CODE&gt;&lt;/P&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Stop the firewall by typing &lt;CODE&gt;fwstop&lt;/CODE&gt; at a command prompt. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Restart the firewall and load the changes by typing &lt;CODE&gt;fwstop&lt;/CODE&gt; at a command prompt. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;In the Policy Editor at &lt;B&gt;Manage | Network Objects | New | Workstation&lt;/B&gt;, define the Firewall Suite machine as a workstation. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;In the Policy Editor at &lt;B&gt;Manage | OPSEC Applications | New | OPSEC Application&lt;/B&gt;, define the Firewall Suite as an OPSEC application. In the Hosts drop-down list, select the workstation you defined in the previous step. &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;P&gt;If you are using Check Point NG with a Feature Pack (FP) installed, additional configuration to the &lt;CODE&gt;fwopsec.conf&lt;/CODE&gt; file needs to be made. &lt;P&gt;The following line must be added in addition to the changes above for the OPSEC LEA connection to work properly. &lt;P&gt;&lt;STRONG&gt;For an authenticated connection&lt;/STRONG&gt;: &lt;P&gt;&lt;CODE&gt;lea_server          auth_type          auth_opsec&lt;/CODE&gt; &lt;P&gt;&lt;CODE&gt;&lt;FONT face=Tahoma&gt;&lt;STRONG&gt;For an unauthenticated connection&lt;/STRONG&gt;:&lt;/CODE&gt; &lt;P&gt;&lt;CODE&gt;&lt;/CODE&gt;&lt;CODE&gt;&lt;FONT face=Tahoma size=2&gt;&lt;/FONT&gt;lea_server          auth_type          none&lt;/CODE&gt;&lt;/P&gt;&lt;P&gt;&lt;CODE&gt;&lt;/FONT&gt; &lt;/P&gt;&lt;/CODE&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as:&lt;DD&gt;NETIQKB2395&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 13 Apr 2006 03:31:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Unable to update URL Categorization database.</title><link>https://support.levelblue.com/kb/Goto10785.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;WebTrends Firewall Suite 4.1c&lt;LI&gt;Security Reporting Center 2.1&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Unable to update URL Categorization database.&lt;LI&gt;Error: 'Download Aborted.'&lt;LI&gt;Error: 'No URL Categorization information found.'&lt;LI&gt;Error: 'No information for this section has been analyzed.'&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;Firewall Suite is unable to access the SurfControl download site due to a proxy server restriction.&lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;In order to resolve this issue you will need to make sure that your firewall and/or proxy server allows access to &lt;STRONG&gt;listsrv.surfcontrol.com&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;Once you have verified that the proxy server is configured to allow a connection to this site, you will need to configure Firewall Suite to access the Internet through the proxy server:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Click &lt;STRONG&gt;Tools &lt;/STRONG&gt;|&lt;STRONG&gt; Options&lt;/STRONG&gt;. &lt;LI&gt;Expand &lt;STRONG&gt;Main&lt;/STRONG&gt;. &lt;LI&gt;Select &lt;STRONG&gt;Access to Internet&lt;/STRONG&gt;. &lt;LI&gt;Check the box next to &lt;STRONG&gt;Connect through a Proxy Server&lt;/STRONG&gt;. &lt;LI&gt;Configure your proxy address and port. &lt;LI&gt;Only check &lt;STRONG&gt;HTTP access requires a Username / Password&lt;/STRONG&gt; if your proxy server requires authentication. &lt;LI&gt;Click &lt;STRONG&gt;OK&lt;/STRONG&gt;.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;After this has been done you should be able to update your URL Categorization database.&lt;/P&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;If you access the Internet through a firewall please verify that there is no rule on the firewall that prevents access to &lt;STRONG&gt;listsrv.surfcontrol.com&lt;/STRONG&gt;.&lt;P&gt;Firewall Suite only supports basic and NTLM authentication through a proxy server.&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as:&lt;DD&gt;NETIQKB1428&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 13 Apr 2006 03:28:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>How do I get rid of the old logfiles from Firewall Suite?</title><link>https://support.levelblue.com/kb/Goto10356.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite 4.0x&lt;LI&gt; Firewall Suite 4.1x&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I get rid of the old logfiles from Firewall Suite?&lt;P&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;When attempting to delete log files from the &lt;EM&gt;SYSLOG&lt;/EM&gt; or &lt;EM&gt;LEACache&lt;/EM&gt; directories in Firewall Suite, the logs are not deleted or the machiine appears to hang.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;This behavior can be caused if the Firewall Suite Scheduler service is analyzing a profile in the background.&lt;P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;To delete the logfiles from the Firewall Suite (FWS) machine, perform the following steps:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;In the FWS main menu, select &lt;STRONG&gt;File&lt;/STRONG&gt; |&lt;STRONG&gt; Exit and Unload&lt;/STRONG&gt;.  This will stop the FWS application and the Scheduler service.&lt;BR&gt;&lt;LI&gt;Delete the desired files from the &lt;EM&gt;X&lt;/EM&gt;:\&lt;EM&gt;Program Files&lt;/EM&gt;\&lt;EM&gt;WebTrends&lt;/EM&gt; &lt;EM&gt;Firewall&lt;/EM&gt; &lt;EM&gt;Suite&lt;/EM&gt;\&lt;EM&gt;SYSLOG&lt;/EM&gt;  and &lt;EM&gt;X&lt;/EM&gt;:\&lt;EM&gt;Program Files&lt;/EM&gt;\&lt;EM&gt;WebTrends&lt;/EM&gt; &lt;EM&gt;Firewall&lt;/EM&gt; &lt;EM&gt;Suite&lt;/EM&gt;\&lt;EM&gt;SYSLOG&lt;/EM&gt;\&lt;EM&gt;LEACache&lt;/EM&gt; directories, where X: is the installation drive.&lt;BR&gt;&lt;LI&gt;Restart the Firewall Suite application and Scheduler service to resume profile analysis.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;If the files cannot be deleted by using the above method, then the files are most likely being locked by the host operating system.  In this scenario, a system restartt may be required to release the files from the locked state.&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as:&lt;DD&gt;NETIQKB37260&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 13 Apr 2006 03:24:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>The Firewall report is showing incoming e-mail as outgoing activity.</title><link>https://support.levelblue.com/kb/Goto10745.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;The Firewall report is showing incoming e-mail as outgoing activity.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;If a company has a mail server located outside of its firewall, then all e-mail, whether POP or SMTP, will be reported as outgoing activity. This is because the user is initiating the connection to the mail server to retrieve his or her mail. This is similar to web activity. Even though all of the files are coming in through the firewall, it is considered outgoing activity because it was initiated by a user behind the firewall.&lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;BR&gt;The definition of incoming activity is that the destination is inside the firewall. Outgoing activity is defined as activity that has a destination outside of the firewall. &lt;BR&gt;&lt;BR&gt;For example, when a user is working from within the firewall and is trying to retrieve mail from a server that is outside, the user is connecting to the mail server and not the other way around.&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as:&lt;DD&gt;NETIQKB2532&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 13 Apr 2006 03:15:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>In the firewall activity reports for Gauntlet, internal and external users are confused by the e-mail traffic sections.</title><link>https://support.levelblue.com/kb/Goto10585.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;In the firewall activity reports for Gauntlet, internal and external users are confused in the e-mail traffic sections.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;&lt;P&gt;Because of the manner in which Gauntlet firewalls record e-mail traffic, it is necessary to add an additional entry in the &lt;B&gt;IP's Behind Firewall&lt;/B&gt; section of the profile set-up for the domain of the internal e-mail senders. &lt;BR&gt;&lt;BR&gt;&lt;/P&gt;&lt;P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;For example, if the domain is example.com, add &lt;B&gt;&lt;A href="mailto:*@example.com"&gt;*@example.com&lt;/A&gt;&lt;/B&gt; to the &lt;B&gt;IP's behind Firewall&lt;/B&gt; tab. This will place the e-mail senders in their correct areas of the final report. &lt;BR&gt;&lt;BR&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as:&lt;DD&gt;NETIQKB2368&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Thu, 13 Apr 2006 03:14:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item></channel></rss>