﻿<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>LevelBlue Knowledge Base » Knowledgebase » Legacy Products » Security Reporting Center</title><generator>InstantKB.NET 2.0.6</generator><description>LevelBlue Knowledge Base</description><link>https://support.levelblue.com/kb/</link><webMaster>website@m86security.com</webMaster><lastBuildDate>Tue, 21 Apr 2026 19:38:04 GMT</lastBuildDate><ttl>20</ttl><item><title>What versions of Marshal Security products are currently supported by LevelBlue Technical Support?</title><link>https://support.levelblue.com/kb/Goto10920.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;MailMarshal (SEG) &lt;/li&gt;    &lt;li&gt;MailMarshal ECM/MailMarshal Exchange &lt;/li&gt;    &lt;li&gt;MailMarshal SPE &lt;/li&gt;    &lt;li&gt;MailMarshal SES &lt;/li&gt;    &lt;li&gt;Marshal Reporting Console &lt;/li&gt;    &lt;li&gt;WebMarshal &lt;/li&gt;    &lt;li&gt;Bitdefender for Marshal&lt;/li&gt;    &lt;li&gt;McAfee for Marshal &lt;/li&gt;    &lt;li&gt;Sophos for Marshal &lt;/li&gt;    &lt;li&gt;Other Products    &lt;ul&gt;        &lt;li&gt;MailMarshal Appliance e10000 &lt;/li&gt;        &lt;li&gt;MailMarshal Management Pack for MOM &lt;/li&gt;        &lt;li&gt;MailMarshal Management Pack for SCOM &lt;/li&gt;        &lt;li&gt;Marshal EndPoint Security &lt;/li&gt;        &lt;li&gt;Security Reporting Center &lt;/li&gt;        &lt;li&gt;Firewall Suite &lt;/li&gt;        &lt;li&gt;imMarshal for MSN &lt;/li&gt;        &lt;li&gt;Counterspy for Marshal &lt;/li&gt;        &lt;li&gt;Kaspersky for Marshal&lt;/li&gt;        &lt;li&gt;PestPatrol for Marshal &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;p&gt;What versions of Content Security (Marshal) products are currently supported by LevelBlue Technical Support? &lt;/p&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;For full details about supported versions of current products, see the articles linked below:&lt;/p&gt;&lt;a name="seg"&gt;&lt;/a&gt;&lt;blockquote style="margin-right: 0px;" dir="ltr"&gt;&lt;/blockquote&gt;&lt;h3&gt;Premises Email Security&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20961.aspx" class="ApplyClass" target="_blank"&gt;Article Q20961&lt;/a&gt; covers the following products:    &lt;ul&gt;        &lt;li&gt;MailMarshal (SEG) &lt;/li&gt;        &lt;li&gt;MailMarshal ECM/MailMarshal Exchange &lt;/li&gt;        &lt;li&gt;Secure Email Server (SES) &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Web Content Security&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20962.aspx" class="ApplyClass" target="_blank"&gt;Article Q20962&lt;/a&gt; covers WebMarshal. &lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Service Provider Email Security&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20963.aspx" class="ApplyClass" target="_blank"&gt;Article Q20963&lt;/a&gt; covers MailMarshal SPE. &lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Anti-Virus and Reporting&lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle20964.aspx" class="ApplyClass" target="_blank"&gt;Article Q20964&lt;/a&gt; covers the following products:    &lt;ul&gt;        &lt;li&gt;Bitdefender for Marshal&lt;/li&gt;        &lt;li&gt;McAfee for Marshal &lt;/li&gt;        &lt;li&gt;Sophos for Marshal &lt;/li&gt;        &lt;li&gt;Marshal Reporting Console&lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;hr /&gt;&lt;h3&gt;Deprecated and Discontinued Products&lt;/h3&gt;&lt;dl&gt;    &lt;dt&gt;e10000 (MailMarshal Node Appliance)&lt;/dt&gt;    &lt;dd&gt;End of support: March 31, 2011&lt;/dd&gt;    &lt;dt&gt;EndPoint Security&lt;/dt&gt;    &lt;dd&gt;    End of support: May 1, 2013&lt;/dd&gt;    &lt;dt&gt;MailMarshal Management Pack for MOM&lt;/dt&gt;    &lt;dd&gt;End of support: May 1, 2013&lt;/dd&gt;    &lt;dt&gt;MailMarshal Management Pack for SCOM&lt;/dt&gt;    &lt;dd&gt;End of support: May 1, 2013&lt;/dd&gt;    &lt;dt&gt;Security Reporting Center (Windows Version)&lt;/dt&gt;    &lt;dd&gt;End of support: December 31, 2009&lt;/dd&gt;    &lt;dt&gt;Security Reporting Center (Solaris Version)&lt;/dt&gt;    &lt;dd&gt;Withdrawn&lt;/dd&gt;    &lt;dt&gt;Firewall Suite&lt;/dt&gt;    &lt;dd&gt;Withdrawn&lt;/dd&gt;    &lt;dt&gt;imMarshal for MSN&lt;/dt&gt;    &lt;dd&gt;Withdrawn&lt;/dd&gt;    &lt;dt&gt;Counterspy for Marshal&lt;/dt&gt;    &lt;dd&gt;End of support: January 1, 2014&lt;/dd&gt;    &lt;dt&gt;Kaspersky for Marshal&lt;/dt&gt;    &lt;dd&gt;End of support: November 22, 2023&lt;/dd&gt;    &lt;dt&gt;PestPatrol for Marshal&lt;/dt&gt;    &lt;dd&gt;End of support: January 1, 2014&lt;/dd&gt;    &lt;dt&gt;&lt;br /&gt;    &lt;/dt&gt;&lt;/dl&gt;&lt;dl&gt;&lt;em&gt;    &lt;dt&gt;This article was previously published as: &lt;/dt&gt;    &lt;dd&gt;NETIQKB33882 &lt;/dd&gt;    &lt;/em&gt;&lt;/dl&gt;</description><pubDate>Sun, 26 Nov 2023 18:02:27 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>What is NETSTAT?</title><link>https://support.levelblue.com/kb/Goto10875.aspx</link><description>&lt;h2&gt;&lt;/h2&gt;&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;MailMarshal (SEG) &lt;/li&gt;    &lt;li&gt;WebMarshal &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;What is NETSTAT?&lt;p&gt; &lt;/p&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;You can use the &lt;strong&gt;NETSTAT&lt;/strong&gt; command to check the operation of local ports to see if they are configured properly and if they are receiving data. &lt;/p&gt;&lt;p&gt;You can access a wealth of helpful information about the NETSTAT utility from the Help utility on your Microsoft Windows workstation or server. This information can be found by clicking &lt;strong&gt;START | HELP | INDEX&lt;/strong&gt; and by entering the keyword &lt;strong&gt;netstat&lt;/strong&gt;. &lt;/p&gt;&lt;table cellspacing="1" cellpadding="7" border="1"&gt;    &lt;tbody&gt;        &lt;tr&gt;            &lt;th style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;&lt;strong&gt;Port&lt;/strong&gt;&lt;/p&gt;            &lt;/th&gt;            &lt;th style="height: 16px; width: 25%;" valign="top"&gt;&lt;strong&gt;&lt;/strong&gt;            &lt;p&gt;&lt;strong&gt;Protocol&lt;/strong&gt;&lt;/p&gt;            &lt;/th&gt;            &lt;th style="height: 16px; width: 35%;" valign="top"&gt;&lt;strong&gt;&lt;/strong&gt;            &lt;p&gt;&lt;strong&gt;NETSTAT - WinNT&lt;/strong&gt;&lt;/p&gt;            &lt;/th&gt;            &lt;th style="height: 16px; width: 31%;" valign="top"&gt;&lt;strong&gt;&lt;/strong&gt;            &lt;p&gt;&lt;strong&gt;NETSTAT - UNIX&lt;/strong&gt;&lt;/p&gt;            &lt;/th&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 15px; width: 9%;" valign="top"&gt;            &lt;p&gt;21&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 15px; width: 25%;" valign="top"&gt;            &lt;p&gt;FTP&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 15px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 21&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 15px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 21&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;25&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;SMTP&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 25&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 25&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;53&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;DNS (Note 1)&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 53&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;Netstat -an 1 | grep 53&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;80&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;HTTP&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 80&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 80&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 32px; width: 9%;" valign="top"&gt;            &lt;p&gt;99&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 32px; width: 25%;" valign="top"&gt;            &lt;p&gt;WebTrends Remote Reporting&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 32px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 99&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 32px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 99&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;110&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;POP3&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 110&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 110&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;137&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;WINS (Note 2)&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 137&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 137&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;514&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;SYSLOG&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 514&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 514&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="height: 16px; width: 9%;" valign="top"&gt;            &lt;p&gt;18184&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 25%;" valign="top"&gt;            &lt;p&gt;OPSEC LEA&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 35%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | findstr 18184&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;            &lt;td style="height: 16px; width: 31%;" valign="top"&gt;            &lt;p&gt;&lt;code&gt;netstat -an 1 | grep 18184&lt;/code&gt;&lt;/p&gt;            &lt;/td&gt;        &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;Note 1:&lt;/strong&gt; &lt;strong&gt;DNS&lt;/strong&gt; is the acronym for &lt;em&gt;Domain Name Service&lt;/em&gt;, a name resolution scheme that originated with the Berkeley version of Unix. DNS is used throughout the Internet for host-name resolution and is a constantly evolving protocol. Along with host-name resolution, it helps in e-mail routing and other TCP/IP-based application services. The most popular Unix-based implementation of DNS is the Berkeley Internet Name Daemon, or BIND.    &lt;ul&gt;        &lt;li&gt;SEG/MailMarshal SMTP uses DNS port 53 TCP and UDP. &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;    &lt;li&gt;&lt;strong&gt;Note 2: WINS&lt;/strong&gt; is the acronym for &lt;em&gt;Windows Internet Naming Service&lt;/em&gt;, Microsoft's extension of the NetBIOS name resolution scheme. Computers utilize port 137 for WINS resolution.    &lt;ul&gt;        &lt;li&gt;If WINS resolution is enabled, local machine names can be resolved without explicit DNS entries. &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;strong&gt;Once you type the command, look for a response:&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;&lt;ul&gt;    &lt;p&gt; &lt;/p&gt;    &lt;li&gt;If nothing appears, the port is not being utilized.    &lt;ul&gt;        &lt;li&gt;If you are checking the response from a Marshal product, check to see if the appropriate service is running. If it is, you may need to restart the server computer and run NETSTAT again. &lt;/li&gt;    &lt;/ul&gt;    &lt;/li&gt;    &lt;li&gt;    &lt;p&gt;If the word &lt;em&gt;"ESTABLISHED"&lt;/em&gt; appears, then the port is configured properly and it is receiving data. &lt;/p&gt;    &lt;p&gt; &lt;/p&gt;    &lt;/li&gt;    &lt;li&gt;If the words &lt;em&gt;"TIME-WAIT"&lt;/em&gt; appear, the port is configured properly but it is not receiving data.&lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;&lt;/em&gt;&lt;/p&gt;&lt;dl&gt;&lt;em&gt;    &lt;dt&gt;This article was previously published as: entries&lt;/dt&gt;    &lt;dd&gt;NETIQKB2609 &lt;/dd&gt;    &lt;/em&gt;&lt;/dl&gt;</description><pubDate>Wed, 01 Apr 2020 00:00:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>Where do I send a feature request for a LevelBlue Marshal product?</title><link>https://support.levelblue.com/kb/Goto12703.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;MailMarshal (SEG)&lt;/li&gt;    &lt;li&gt;MailMarshal ECM/MailMarshal Exchange&lt;/li&gt;    &lt;li&gt;MailMarshal SPE&lt;/li&gt;    &lt;li&gt;WebMarshal&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;Where do I send a feature request for a LevelBlue Marshal product? &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Procedure:&lt;/h2&gt;&lt;p&gt;If you want to request a new feature or you want to suggest an improvement for any product, you can &lt;a href="https://support.levelblue.com/contact-support.asp" class="ApplyClass" target="_blank"&gt;contact Technical Support&lt;/a&gt;. You can also enquire through your account manager or reseller.&lt;/p&gt;</description><pubDate>Sun, 01 Mar 2020 00:00:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>What is the WELF log file format?</title><link>https://support.levelblue.com/kb/Goto10899.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;WebMarshal 6.X &lt;/li&gt;    &lt;li&gt;WebMarshal 7.X &lt;/li&gt;    &lt;li&gt;Security Reporting Center 2.X &lt;/li&gt;    &lt;li&gt;WebTrends Firewall Suite &lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;What is the WELF log file format?&lt;p&gt; &lt;/p&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;&lt;strong&gt;WELF&lt;/strong&gt; is the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;W&lt;/span&gt;&lt;/strong&gt;ebTrends &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;E&lt;/span&gt;&lt;/strong&gt;nhanced &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;L&lt;/span&gt;&lt;/strong&gt;og file &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;F&lt;/span&gt;&lt;/strong&gt;ormat. &lt;/p&gt;&lt;p&gt;The WELF Reference defines the WebTrends industry standard log file exchange format. Any firewall or VPN system logging to this format will be compatible with Firewall Suite 2.0 and later, Firewall Reporting Center 1.0 and later, and Security Reporting Center 2.0 and later. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;WebMarshal 6.X and WebMarshal 7.X&lt;/strong&gt; "Traffic Logging" logs can be created in the WELF format. &lt;/p&gt;&lt;ul&gt;    &lt;li&gt;For full details of the fields logged by WebMarshal, see LevelBlue Knowledgebase article &lt;a href="https://support.levelblue.com/kb/KnowledgebaseArticle21119.aspx" target="_blank" class="ApplyClass"&gt;Q21119&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;&lt;h3&gt;Log File Format&lt;/h3&gt;&lt;p&gt;A log file is made up of records. Each record makes up a single line of the file. Records must be in chronological order. The earliest record is the first record in the file; the most recent record is the last record in the file. The WebTrends Enhanced Log Format places no restrictions on log file names or log file rotation policies. &lt;/p&gt;&lt;h3&gt;Record Format&lt;/h3&gt;&lt;p&gt;A record is terminated by the character sequence carriage return-line feed (0x0D-0x0A). There may be no carriage-returns or line-feeds within a record; this format results in a single record per line. &lt;/p&gt;&lt;p&gt;Each record is made up of fields. The record identifier field (id=) must be the first field in a record. All other fields can appear in any order. &lt;/p&gt;&lt;p&gt;Aside from a few &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Required%20Fields" class="solutionlink" target="_self"&gt;required fields&lt;/a&gt;, you can decide which &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Optional%20Fields" class="solutionlink" target="_self"&gt;optional fields&lt;/a&gt; are included in the record. You may want some fields to appear in only certain records because they are only relevant to certain types of activity (for example, the operation on an HTTP request). &lt;/p&gt;&lt;p&gt;Some optional fields may be left out if the firewall vendor chooses, but doing so typically results in reports that are less complete. Refer to the field descriptions to determine which fields are required for tables. &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Sample Record&lt;/strong&gt;&lt;br /&gt;(In a real log file, the record would reside on one line.) &lt;/p&gt;&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; This sample record should give you a sense of what a record looks like. It does not contain all the fields that are available and described in this document. Additional &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Sample%20Records" class="solutionlink" target="_self"&gt;sample records&lt;/a&gt; are fully documented in the HELP Index built into the Firewall Suite product. &lt;/p&gt;&lt;p&gt;&lt;code&gt;id=firewall time="2000-2-4 12:01:01" fw=192.168.0.238 pri=6 rule=3 proto=http src=192.168.0.23 dst 6.1.0.36 rg=www.webtrends.com/index.html op=GET result 0 rcvd=1426&lt;/code&gt; &lt;/p&gt;&lt;p&gt;&lt;table cellspacing="0" cellpadding="5" width="500" border="1"&gt;    &lt;tbody&gt;        &lt;tr&gt;            &lt;td style="width: 50%;" valign="top"&gt;&lt;strong&gt;&lt;span style="font-size: 13px;"&gt;Required Fields&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;            &lt;td style="width: 50%;" valign="top"&gt;&lt;strong&gt;&lt;span style="font-size: 13px;"&gt;Optional Fields&lt;/span&gt;&lt;/strong&gt;&lt;/td&gt;        &lt;/tr&gt;        &lt;tr&gt;            &lt;td style="width: 50%;" valign="top"&gt;&lt;span style="font-size: 13px;"&gt;&lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Record%20identifier" class="solutionlink" target="_self"&gt;Record identifier&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Date/time" class="solutionlink" target="_self"&gt;Date/time&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Firewall%20IP%20address%20or%20name" class="solutionlink" target="_self"&gt;Firewall IP address or name&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Priority%20of%20the%20record" class="solutionlink" target="_self"&gt;Priority of the record&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;            &lt;td style="width: 50%;" valign="top"&gt;&lt;span style="font-size: 13px;"&gt;&lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Rule" class="solutionlink" target="_self"&gt;Rule&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Protocol" class="solutionlink" target="_self"&gt;Protocol&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Duration" class="solutionlink" target="_self"&gt;Duration&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Bytes%20Transferred" class="solutionlink" target="_self"&gt;Bytes Transferred&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Bytes%20Received" class="solutionlink" target="_self"&gt;Bytes Received&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Source" class="solutionlink" target="_self"&gt;Source&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Source%20Name" class="solutionlink" target="_self"&gt;Source Name&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Destination" class="solutionlink" target="_self"&gt;Destination&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Destination%20Name" class="solutionlink" target="_self"&gt;Destination Name&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#User" class="solutionlink" target="_self"&gt;User&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Operation" class="solutionlink" target="_self"&gt;Operation&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#URL%20Accessed" class="solutionlink" target="_self"&gt;URL Accessed&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Result%20Code" class="solutionlink" target="_self"&gt;Result Code&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#VPN" class="solutionlink" target="_self"&gt;VPN&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Type" class="solutionlink" target="_self"&gt;Type&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Message" class="solutionlink" target="_self"&gt;Message&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Referring%20Site" class="solutionlink" target="_self"&gt;Referring Site&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Agent" class="solutionlink" target="_self"&gt;Agent&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Category" class="solutionlink" target="_self"&gt;Category&lt;/a&gt; &lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#Category%20Action" class="solutionlink" target="_self"&gt;Category Action &lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#WMCache"&gt;WebMarshal Cache Result&lt;/a&gt;&lt;br /&gt;            &lt;a href="https://support.levelblue.com/kb/article.aspx?id=10899#WMClass"&gt;WebMarshal Classification&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;        &lt;/tr&gt;    &lt;/tbody&gt;&lt;/table&gt;&lt;/p&gt;&lt;h3&gt;&lt;a name="Required Fields" target="_blank"&gt;Required Fields&lt;/a&gt; (WELF) &lt;/h3&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Record identifier" target="_blank"&gt;Record identifier&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The id= field identifies the type of record. For log files conforming to this document, the type will always be firewall. For example,    &lt;p&gt;&lt;code&gt;id=firewall&lt;/code&gt; &lt;/p&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Date/time" target="_blank"&gt;Date/time&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The time= field shows the date and time of the event, in terms of local time. The form of the date/time field is shown below (Note: Since this field contains spaces, it must be enclosed in double quotes):    &lt;p&gt;&lt;code&gt;time="yyyy-mm-dd hh:mm:ss"&lt;/code&gt; (where): &lt;/p&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;yyyy: year (always 4 digits)&lt;br /&gt;mm: number between 1 and 12 (inclusive) to represent the month (1 or 2 digits)&lt;br /&gt;dd: day of the month, 1 based (1 or 2 digits)&lt;br /&gt;hh: hour, based on 24-hour clock (1 or 2 digits)&lt;br /&gt;mm: minute (1 or 2 digits)&lt;br /&gt;ss: second (1 or 2 digits) &lt;/p&gt;&lt;p&gt;For example, &lt;/p&gt;&lt;p&gt;6:00 a.m. on January 1, 2000 would be represented as:&lt;br /&gt;time="2000-1-1 6:0:0" &lt;/p&gt;&lt;p&gt;It could also be represented as:&lt;br /&gt;time="2000-01-01 06:00:00" &lt;/p&gt;&lt;p&gt;6:00 p.m. on the same day would be represented as:&lt;br /&gt;time="2000-01-01 18:00:00" &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Firewall IP address or name" target="_blank"&gt;Firewall IP address or name&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The fw= field identifies the firewall that generated the log record. This is most often represented as an IP address or a machine name. Firewall Suite uses this field for licensing. The user's licensing is simplified if the firewall is consistent in logging this field. In other words, a particular firewall should always log its IP address or always log its machine name, but not both. If a firewall is logging its IP address, it should always log the IP address of the internal network interface or always log the IP address of the external network interface, not a mixture of the two.    &lt;p&gt;An example using the IP address of the firewall:&lt;br /&gt;    &lt;code&gt;fw=192.168.0.238&lt;/code&gt; &lt;/p&gt;    &lt;p&gt;An example using the machine name of the firewall:&lt;br /&gt;    &lt;code&gt;fw=ACME_FIREWALL&lt;/code&gt; &lt;/p&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Priority of the record" target="_blank"&gt;Priority of the record&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The pri= field specifies the priority of the event. The following is a list of valid values: &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;0 - emergency&lt;br /&gt;1 - alert&lt;br /&gt;2 - critical&lt;br /&gt;3 - error&lt;br /&gt;4 - warning&lt;br /&gt;5 - notice&lt;br /&gt;6 - information&lt;br /&gt;7 - debug &lt;/p&gt;&lt;p&gt;Messages are placed in various tables based on the priority. Messages with priorities 0, 1, and 2 are included in the critical errors tables, messages with priorities of 3 and 4 are included in the errors and warnings tables, and messages with priorities of 5, 6, and 7 are included in the informational messages tables. For example: &lt;/p&gt;&lt;p&gt;&lt;code&gt;pri=0&lt;br /&gt;pri=5&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;h3&gt;&lt;a name="Optional Fields" target="_blank"&gt;Optional Fields&lt;/a&gt; (WELF) &lt;/h3&gt;&lt;p&gt;The following fields for the WebTrends Enhanced Log File Format are optional: &lt;/p&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Rule" target="_blank"&gt;Rule&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The rule= field specifies the rule that triggered the log entry. This field is used to generate tables that help the user understand that the rules they have set up are working properly. Three tables are based on the rule field: internal IP addresses triggering firewall rules, external IP addresses triggering firewall rules, and protocols triggering firewall rules. Most firewalls log this field as an integer identifying a particular rule. However, rules could also be identified by name and logged as such in this field. For example: &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;&lt;code&gt;rule=4&lt;br /&gt;rule=12 &lt;/code&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Protocol" target="_blank"&gt;Protocol&lt;/a&gt;&lt;/strong&gt;&lt;br /&gt;    The proto= fields specifies the protocol used by the event. A large number of tables and graphs depend on the presence of the protocol field. Although this it is not a required field, without it, reports lack important information. Some firewalls do not log the protocol, but log the service. If this is the case, the service can be logged in this field. For example,    &lt;p&gt;&lt;code&gt;proto=http&lt;br /&gt;    proto=ftp&lt;br /&gt;    proto=snmp&lt;br /&gt;    &lt;/code&gt;&lt;br /&gt;    &lt;strong&gt;Default protocol mapping&lt;/strong&gt;&lt;br /&gt;    Firewall Suite includes a file called wtprotocols.txt that maps protocol fields found in log files to types of traffic that appear in reports (for example, pop3 in the log file is displayed as e-mail in the report). &lt;/p&gt;    &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The following is an extract from the &lt;strong&gt;wtprotocols.txt&lt;/strong&gt; file that ships with WebTrends Firewall Suite:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;[web]&lt;br /&gt;http&lt;br /&gt;https&lt;br /&gt;80/tcp&lt;br /&gt;[email]&lt;br /&gt;pop3&lt;br /&gt;smtp&lt;br /&gt;smap&lt;br /&gt;[ftp]&lt;br /&gt;ftp&lt;br /&gt;ftp-data&lt;br /&gt;[telnet]&lt;br /&gt;telnet&lt;br /&gt;[realaudio]&lt;br /&gt;realaudio&lt;br /&gt;&lt;/code&gt;&lt;br /&gt;&lt;strong&gt;Map new protocols&lt;/strong&gt;&lt;br /&gt;Your log files may contain protocols not included in this file. Map them using the Protocols tab in the Firewall Options dialog in the GUI (a mapping changes file named protocols.txt is created). Or you can create the protocols.txt file and map new protocols. Follow the syntax of the wtprotocols.txt file: use the types of traffic designations enclosed in square brackets and list new protocols for that type of traffic, each on a single line. Note: Unmapped protocols are grouped for reports in a type of traffic designation called "other." &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Duration" target="_blank"&gt;Duration&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The duration= field specifies the time that is required to perform the operation, in seconds. For example, for an FTP file transfer, the duration is the amount of time used to perform the transfer. Although Firewall Suite tracks this field, it is not currently shown in any tables or graphs. We recommend that if the this information is available, it should be logged so that it can be used in the future. For example, to indicate that an operation required 3 minutes exactly, the duration field could look like this:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;duration=180.00&lt;br /&gt;&lt;/code&gt;&lt;br /&gt;or like this:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;duration=180&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Bytes Transferred" target="_blank"&gt;Bytes Transferred &lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The sent= field specifies the number of bytes transferred from the source to the destination. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;sent=1426&lt;br /&gt;sent=512&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Bytes Received" target="_blank"&gt;Bytes Received&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The rcvd= field specifies the number of bytes transferred from the destination to the source. For example:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;rcvd=1426&lt;br /&gt;rcvd=512&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Source" target="_blank"&gt;Source&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The src= field specifies the IP address that generated the event. For example:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;src=192.168.0.23&lt;br /&gt;src 6.0.2.1&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Source Name" target="_blank"&gt;Source Name&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The srcname= fields is a more user-friendly version of the src= field. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;srcname=mickm@example.com&lt;br /&gt;srcname=www.example.com&lt;br /&gt;srcname=JIMS_SYSTEM&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Destination" target="_blank"&gt;Destination&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The dst= field specifies the IP address that received the event. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;dst=192.168.0.23&lt;br /&gt;dst 6.0.2.1&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Destination Name" target="_blank"&gt;Destination Name&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The dstname= field is a more user-friendly version of the dst= field. For example, &lt;br /&gt;&lt;br /&gt;&lt;code&gt;dstname=EXAMPLE_SERVER&lt;br /&gt;dstname=www.example.com&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="User" target="_blank"&gt;User&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;If users are authenticating through the firewall, then the authenticated user name can be logged in the user= field. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;user=JohnB&lt;br /&gt;user=MarySmith&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Operation" target="_blank"&gt;Operation&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;For HTTP and FTP requests, the op= field is the operation such as GET, POST, etc. For example, &lt;br /&gt;&lt;br /&gt;&lt;code&gt;op=GET&lt;br /&gt;op=POST&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="URL Accessed" target="_blank"&gt;URL Accessed &lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;For HTTP and FTP requests, the arg= field is the URL accessed. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;arg=/PRODUCTS/GOODIES/GIFS/IWAWARD2.gif&lt;br /&gt;arg=/PRODUCTS/GOODIES/download.htm?Product=Standard&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Result Code" target="_blank"&gt;Result Code&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;For HTTP requests, the result= field is the standard result code, such as 200 for success, 304 for returned from cache, etc. For example, &lt;br /&gt;&lt;br /&gt;&lt;code&gt;arg 0&lt;br /&gt;arg=304&lt;br /&gt;arg=404&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="VPN" target="_blank"&gt;VPN&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The vpn= field identifies a particular VPN. This value is used to generate tables showing the most highly used VPNs and tables correlating particular users to particular VPNs. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;vpn="NY Branch VPN"&lt;br /&gt;vpn=Sales&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Type" target="_blank"&gt;Type&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The firewall vendor can use the type= field to cause records to be placed into the tables relating to VPN events or relating to firewall management events. (Other categories may be defined in the future.)&lt;br /&gt;A record can be put into more than one category by separating values by commas.&lt;br /&gt;The currently defined types are:&lt;br /&gt;&lt;br /&gt;· vpn - the record is a VPN event.&lt;br /&gt;&lt;br /&gt;· mgmt - the record is a firewall management event. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;type=vpn&lt;br /&gt;type=mgmt&lt;br /&gt;type=vpn,mgmt&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Message" target="_blank"&gt;Message&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The msg= field is the basis for the tables showing detailed Critical Events, Errors and Warnings, VPN events, and Firewall Management events. Firewall Suite generates summary tables showing these types of events. Firewall Suite will also generate detailed tables associating users with these events. To make this happen, the user(s) need to be identified using the Src=, Srcname=, Dst=, Dstname=, or User= fields. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;msg="VPN starting"&lt;br /&gt;msg="Possible port scan detected"&lt;br /&gt;msg="Firewall configuration changed"&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Referring Site" target="_blank"&gt;Referring Site&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;For incoming web records, the ref= field contains the referring site. For example,&lt;br /&gt;&lt;br /&gt;&lt;code&gt;ref=http://search.yahoo.com/bin/search?p=trends%20internet &lt;/code&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Agent" target="_blank"&gt;Agent&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;For incoming or outgoing web records, the agent= field contains the agent (usually the browser).&lt;br /&gt;&lt;br /&gt;&lt;code&gt;agent="SPRY_Mosaic/v8.32 (Windows 16-bit)"&lt;br /&gt;agent="Microsoft Internet Explorer/4.40.308 (Windows 95)"&lt;br /&gt;agent="Mozilla/3.0 (WinNT; I)"&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Category" target="_blank"&gt;Category&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The cat= field contains the categories to which the accessed site belongs. It is used only for firewalls or proxies capable of categorizing web sites. For example, www.msnbc.com might be categorized as "General News", "Investment", and "Entertainment". If a site belongs to more than one category, these categories should be given in the same cat= field, with a comma separating each category. Note: If a field contains spaces, it must be enclosed in double quotes.&lt;br /&gt;&lt;br /&gt;Use this field should only if dst= (or dstname=) is also present.&lt;br /&gt;For example:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;dst=www.msnbc.com cat=News&lt;br /&gt;dst=www.msnbc.com cat="General News"&lt;br /&gt;dst=www.msnbc.com cat=News,Investment,Entertainment&lt;br /&gt;dstname=www.msnbc.com cat=News,Investment,Entertainment&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="Category Action" target="_blank"&gt;Category Action&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The cat_action= field contains the action taken for the category value of the cat= field. For example, access to gambling web sites may be blocked.&lt;br /&gt;This field should only be present if cat= is also present.&lt;br /&gt;Possible values for this field are: block and pass.&lt;br /&gt;For example:&lt;br /&gt;&lt;br /&gt;&lt;code&gt;dst=www.gambling.com cat=Gambling cat_action=block&lt;br /&gt;dst=www.msnbc.com cat=News cat_action=pass&lt;/code&gt; &lt;/p&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="WMCache" target="_blank"&gt;WebMarshal Cache Result&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;The wmcache= field contains the result of a WebMarshal cache lookup request.&lt;/p&gt;&lt;ul&gt;    &lt;li&gt;Cache status is not written for HTTPS or FTP requests. Only HTTP supports caching. &lt;/li&gt;    &lt;li&gt;This custom field cannot be reported by Security Reporting Center. &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;Possible values for this field are: &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;HIT&lt;/span&gt;, &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;MISS&lt;/span&gt;, &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;REFRESH_HIT&lt;/span&gt; or &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;REFRESH_MISS&lt;/span&gt;.&lt;/p&gt;&lt;ul&gt;    &lt;li&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;wmcache=HIT&lt;/span&gt; indicates that the item was served from cache without checking the origin server. &lt;/li&gt;    &lt;li&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;wmcache=MISS&lt;/span&gt; indicates that the item was not in cache and had to be retrieved from the origin server. &lt;/li&gt;    &lt;li&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;wmcache=REFRESH_HIT&lt;/span&gt; indicates that the cache item required revalidation, and that revalidation was successful. &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;&lt;/span&gt;&lt;/li&gt;    &lt;li&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;wmcache=REFRESH_MISS&lt;/span&gt; indicates that the cache item required revalidation, and that the origin server sent back new data. &lt;/li&gt;&lt;/ul&gt;&lt;/blockquote&gt;&lt;ul&gt;    &lt;li&gt;&lt;strong&gt;&lt;a name="WMClass" target="_blank"&gt;WebMarshal Classification Result&lt;/a&gt;&lt;/strong&gt; &lt;/li&gt;&lt;/ul&gt;&lt;blockquote&gt;&lt;p&gt;Two fields record the result of WebMarshal classification:&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;dclass=&lt;/span&gt; indicates a WebMarshal Domain Classification&lt;br /&gt;&lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;fclass=&lt;/span&gt; indicates a WebMarshal File Classification&lt;br /&gt;&lt;br /&gt;If WebMarshal records multiple classifications, they are included as a comma separated list within double quotes.&lt;br /&gt;&lt;br /&gt;For instance: &lt;span style="font-family: &amp;quot;courier new&amp;quot;;"&gt;dclass="Safe Sites,Search Engines"&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;/blockquote&gt;&lt;p&gt;&lt;strong&gt;&lt;a name="Sample Records" target="_blank"&gt;Sample Records&lt;/a&gt;&lt;/strong&gt; &lt;/p&gt;&lt;p&gt;See the document entitled &lt;strong&gt;WebTrends Enhanced Log Format (WELF) For Firewalls &amp;amp; VPNs&lt;/strong&gt; or the HELP Index built into the Firewall Suite product for examples of records that conform to the WebTrends Enhanced Log File Format. Included among the examples provided are: &lt;/p&gt;&lt;ul&gt;    &lt;li&gt;Sample Web Records &lt;/li&gt;    &lt;li&gt;Sample E-mail Records &lt;/li&gt;    &lt;li&gt;Sample Telnet Records &lt;/li&gt;    &lt;li&gt;Sample FTP Records &lt;/li&gt;    &lt;li&gt;Sample RealAudio Records &lt;/li&gt;    &lt;li&gt;Sample Management Records &lt;/li&gt;    &lt;li&gt;Sample Error Messages &lt;/li&gt;&lt;/ul&gt;&lt;p&gt;&lt;em&gt;&lt;/em&gt;&lt;/p&gt;&lt;dl&gt;&lt;em&gt;    &lt;dt&gt;This article was previously published as: &lt;/dt&gt;    &lt;dd&gt;NETIQKB1301 &lt;/dd&gt;    &lt;/em&gt;&lt;/dl&gt;</description><pubDate>Wed, 06 Nov 2019 18:24:28 GMT</pubDate><dc:creator>Charles</dc:creator></item><item><title>How to collect support log from SR</title><link>https://support.levelblue.com/kb/Goto14554.aspx</link><description>&lt;h2&gt;This article applies to:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;SR 3.x&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Question:&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;How to collect support log from SR?&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;After sign-in to the reporter UI, do following:&lt;/p&gt;&lt;p&gt;&lt;ul&gt;    &lt;li&gt;Administrator --&amp;gt; System Configuration&lt;/li&gt;    &lt;li&gt;Once it opens the reporter configuration window, select "Tools" from "Database" pull down menu.&lt;/li&gt;    &lt;li&gt;Then click on "Generate" to create technical support report package.&lt;/li&gt;    &lt;li&gt;Once finished, click on the “Download” button from the pop-up window.&lt;/li&gt;&lt;/ul&gt;&lt;/p&gt;</description><pubDate>Mon, 23 Apr 2012 08:22:06 GMT</pubDate><dc:creator>Rudolf Kessler</dc:creator></item><item><title>linux vulnerabilities</title><link>https://support.levelblue.com/kb/Goto13990.aspx</link><description>&lt;span id="ctl00_ctlContentPlaceHolder_ctl00_ctlViewArticle_ctlPanelBar_lblArticleText"&gt;&lt;span style="color: #000000;"&gt;&lt;/span&gt;&lt;h2&gt;&lt;span style="color: #000000;"&gt;This article applies to:&lt;/span&gt;&lt;/h2&gt;&lt;ul&gt;    &lt;li&gt;&lt;span style="color: #000000;"&gt;Web Filter (R3000, WF, WFR)&lt;/span&gt; &lt;/li&gt;    &lt;li&gt;&lt;span style="color: #000000;"&gt;Security Reporter (SR)&lt;/span&gt; &lt;/li&gt;    &lt;li&gt;&lt;span style="color: #000000;"&gt;Enterprise Reporter (ER)&lt;/span&gt; &lt;/li&gt;    &lt;li&gt;&lt;span style="color: #000000;"&gt;Threat Analysis Reporter (TAR)&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h2&gt;&lt;span style="color: #000000;"&gt;Question:&lt;/span&gt;&lt;/h2&gt;&lt;p&gt;&lt;span style="color: #000000;"&gt;Please confirm if following vulnerability affects the embedded linux on Trustwave WFR/SR/ER/TAR Appliances. &lt;br /&gt;&lt;br /&gt;&lt;a target="_BLANK" href="http://www.us-cert.gov/current/archive/2010/10/25/archive.html#linux_root_access_vulnerabilities"&gt;http://www.us-cert.gov/current/archive/2010/10/25/archive.html#linux_root_access_vulnerabilities&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="color: #000000;"&gt; &lt;/span&gt;&lt;/p&gt;&lt;span style="color: #000000;"&gt;&lt;h2&gt;Information:&lt;/h2&gt;&lt;p&gt;The Reliable Datagram Sockets (RDS) protocol is not enabled on the named appliances, so they are not vulnerable to this issue.&lt;/p&gt;&lt;/span&gt;&lt;/span&gt;</description><pubDate>Wed, 27 Oct 2010 09:52:20 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>How to Patch MySQL</title><link>https://support.levelblue.com/kb/Goto12094.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;MySQL Community Server 3.23.49 (The version included with SRC) &lt;LI&gt;Security Reporting Center&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;How do I ensure MySQL is patched and up to date?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;Access the MySQL website to find the required patch for your installation. See: &lt;A href="http://www.mysql.com/"&gt;www.mysql.com&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;NOTE: &lt;/STRONG&gt;Review the patches carefully before you use them with your MySQL installation as they are unsupported by Marshal. &lt;/P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;P&gt;Before installing any patches it is adviseable to back up your MySQL database.&lt;/P&gt;</description><pubDate>Sun, 06 Jul 2008 22:01:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>How do I implement Security Reporting Center so that it uses a secure connection? (SRC 2.0)</title><link>https://support.levelblue.com/kb/Goto10360.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.0 &lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;How do I implement Security Reporting Center so that it uses a secure connection?&lt;/LI&gt;&lt;LI&gt;Can Security Reporting Center use an SSL connection?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;&lt;B&gt;SSL Overview&lt;/B&gt;&lt;BR&gt;Sensitive information is often transmitted between Web clients and Web servers. Protecting this information is typically accomplished by sending the data in an encrypted form and subsequently decrypting the data on the receiving side. The Secure Sockets Layer (SSL) protocol provides several features that enable secure transmission of Web traffic. These features include data encryption, server authentication, and message integrity. To enable secure communication from Web clients to Security Reporting Center using SSL, you must first enable SSL support. &lt;P&gt;&lt;B&gt;&lt;I&gt;Important!&lt;/B&gt;&lt;/I&gt;&lt;BR&gt;The steps provided below describe how to enable basic SSL functionality and generate certificates only. Depending on your network configuration and security needs, you may need to consult outside documentation. For advanced configuration concerns, please refer to the SSL resources at the following two sites.  &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;A class=solutionlink href="http://www.apache.org/" target=_blank&gt;http://www.apache.org/&lt;/A&gt;  &lt;P&gt;&lt;A class=solutionlink href="http://www.modssl.org/" target=_blank&gt;http://www.modssl.org/&lt;/A&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;B&gt;SSL Installation Procedure - Windows&lt;/B&gt; &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Install Security Reporting Center, using the instructions described in chapter two of the user guide, which can be found on the following Web page. &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/Security-Reporting-Center/documentation.asp" target=_blank&gt;https://support.levelblue.com/Security-Reporting-Center/documentation.asp&lt;/A&gt; &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Download the file SRC20&lt;CODE&gt;_sslupdate.zip &lt;/CODE&gt;from the Article Attachments section below. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Create a directory called &lt;CODE&gt;sslupdate&lt;/CODE&gt; on your desktop. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Unzip the contents of &lt;CODE&gt;SRC20_sslupdate.zip&lt;/CODE&gt; into the directory on your desktop. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;From this directory, execute &lt;CODE&gt;SSLUpdate.exe&lt;/CODE&gt;. This enables SSL for Apache and installs a self-signed certificate for testing purposes. You may access the secure interface at &lt;CODE&gt;https://&amp;lt;hostname&amp;gt;:9443&lt;/CODE&gt;. &lt;P&gt;* You may opt to install your own certificate at this point, or follow the instructions below. &lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;B&gt;To create a valid SSL certificate, follow these steps.&lt;/B&gt; &lt;P&gt;Using the &lt;CODE&gt;openssl&lt;/CODE&gt; command line utility, generate an RSA private key.  The &lt;CODE&gt;openssl&lt;/CODE&gt; utility is included in the Security Reporting Center distribution, and can be found in &lt;CODE&gt;/common/apache/bin&lt;/CODE&gt; directory of your Security Reporting Center installation. &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Type the following at the command line. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt; cd &amp;lt;Install Directory&amp;gt;/common/apache/bin&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Run &lt;CODE&gt;openssl.exe&lt;/CODE&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;At the &lt;CODE&gt;openssl&amp;gt;&lt;/CODE&gt; prompt, type the following. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;genrsa -des3 -rand ssl.rnd -out server.key 1024&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;The &lt;CODE&gt;openssl&lt;/CODE&gt; utility prompts you for a pass-phrase. Save this pass-phrase in a secure location. &lt;P&gt;&lt;B&gt;&lt;I&gt;Note:&lt;/I&gt;&lt;/B&gt; If you want a DSA private key, replace &lt;CODE&gt;genrsa &lt;/CODE&gt;with &lt;CODE&gt;gendsa&lt;/CODE&gt;. To encrypt your key with DES rather than 3DES, replace &lt;CODE&gt;-des3&lt;/CODE&gt; with &lt;CODE&gt;-des&lt;/CODE&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Typically, the Apache Web server prompts for your pass phrase when the server is started. If you want to start Security Reporting Center without manual interventions, perform the following steps. &lt;UL&gt;&lt;P&gt;&lt;LI&gt;To copy the server key, type the following at the command line. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;copy server.key server.key.org&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Run &lt;CODE&gt;openssl.exe&lt;/CODE&gt; &lt;P&gt;&lt;/P&gt;&lt;LI&gt;At the &lt;CODE&gt;openssl&amp;gt;&lt;/CODE&gt; prompt, type the following. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;  rsa -in server.key.org -out server.key&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Copy the private key to your Apache installation by typing the following.  &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;copy server.key &amp;lt;Install Directory&amp;gt;/common/apache/conf/ssl.key&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Create a certificate signing request. &lt;UL&gt;&lt;P&gt;&lt;LI&gt;Run &lt;CODE&gt;openssl.exe&lt;/CODE&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Type the following at the &lt;CODE&gt;OpenSSL&amp;gt;&lt;/CODE&gt; prompt.  &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;req -new -config openssl.cnf -key server.key -out server.csr &lt;/CODE&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;The &lt;CODE&gt;openssl&lt;/CODE&gt; utility prompts you for a variety of information. Provide information based on your Security Reporting Center installation. This creates the &lt;CODE&gt;server.csr&lt;/CODE&gt; file. Send this file to a Certificate Authority for signing. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;When you get a response (signed certificate) from the Certificate Authority, copy the response to your Apache installation using the following command. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt; copy &amp;lt;signed certificate&amp;gt; &amp;lt;Install Directory&amp;gt;/common/apache/conf/ssl.crt/server.crt&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Restart the &lt;B&gt;NetIQ - Apache&lt;/B&gt; service. &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;B&gt;To create a valid SSL certificate, follow these steps.&lt;/B&gt; &lt;P&gt;Using the &lt;CODE&gt;openssl&lt;/CODE&gt; command-line utility, generate an RSA private key.  The &lt;CODE&gt;openssl&lt;/CODE&gt; command-line utility is included in the Security Reporting Center distribution, and can be found in the following directory. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;&amp;lt;Install Directory&amp;gt;/common/apache/bin&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;OL&gt;&lt;P&gt;&lt;LI&gt;At the command line, type the following. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;cd &amp;lt;Install Directory&amp;gt;/common/apache/bin ps -ef &amp;gt; ~/.rnd ./openssl genrsa -des3 -rand ssl.rnd -out server.key 1024&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;The &lt;CODE&gt;openssl&lt;/CODE&gt; utility prompts you for a pass-phrase. Save this pass-phrase in a secure location. &lt;P&gt;&lt;B&gt;&lt;I&gt;Note:&lt;/B&gt;&lt;/I&gt; If you want a DSA private key, replace &lt;CODE&gt;genrsa&lt;/CODE&gt; with &lt;CODE&gt;gendsa&lt;/CODE&gt;. To encrypt your key with DES rather than 3DES, replace &lt;CODE&gt;-des3&lt;/CODE&gt; with &lt;CODE&gt;-des&lt;/CODE&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Typically, the Apache Web server prompts you for your pass phrase when the server is started. If you want to start the DCS without manual interventions, use the following steps. &lt;UL&gt;&lt;P&gt;&lt;LI&gt;Type the following at a command-line. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;  cp server.key server.key.org&lt;BR&gt;  openssl rsa -in server.key.org -out server.key&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;To change the mode of the &lt;CODE&gt;server.key&lt;/CODE&gt; file, type the following. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;  chmod 400 server.key&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;To copy the private key to your Apache installation, type the following. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;cp server.key &amp;lt;Install Directory&amp;gt;/common/apache/conf/ssl.key&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Create a certificate signing request. Using the &lt;CODE&gt;openssl&lt;/CODE&gt; command-line utility, type the following. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt; ./openssl req -new -config openssl.cnf -key server.key -out server.csr &lt;/CODE&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;The &lt;CODE&gt;openssl&lt;/CODE&gt; utility prompts you for a variety of information. Provide information based on your Security Reporting Center installation. This creates the &lt;CODE&gt;server.csr&lt;/CODE&gt; file. Send this file to a Certificate Authority for signing. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;When you get a response (signed certificate) from the Certificate Authority, copy the response to your Apache installation. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt; cp &amp;lt;signed cert.&amp;gt; &amp;lt;Install Directory&amp;gt;/common/apache/conf/ssl.crt/server.crt&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Restart Apache with SSL enabled by typing this command.  &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;&amp;lt;Install Directory&amp;gt;/common/bin/restartallui.sh&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;To verify that your SSL-enabled Web server started, type the following. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt; ps -elf | grep httpd&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;If Apache has started, you should see several httpd processes running. If not, look at the &lt;CODE&gt;&amp;lt;Install Directory&amp;gt;/common/apache/logs/error_log&lt;/CODE&gt; file for indications of the problems.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;P&gt;With the release of Security Reporting Center 2.1, SSL configuration has changed.  For more information about configuring SSL for version 2.1, please see the following knowledge base article: &lt;/P&gt;&lt;P&gt;&lt;A href="https://support.levelblue.com/kb/article.aspx?id=10359"&gt;https://support.levelblue.com/kb/article.aspx?id=10359&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB18260&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 04:31:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>What are the release notes for Security Reporting Center 2.0?</title><link>https://support.levelblue.com/kb/Goto10834.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.0&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;What are the release notes for Security Reporting Center 2.0? &lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;This version of the Security Reporting Center product (Security Reporting Center) provides several new features. This version also improves usability and extends several capabilities. Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. &lt;P&gt;This document outlines why you should install this version, provides additions to the documentation, and identifies any known issues. We assume you are familiar with previous versions of this product under the name Firewall Reporting Center. For more information about installing Security Reporting Center, see the &lt;I&gt;Security Reporting Center User Guide&lt;/I&gt;. &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;Why Install This Version?&lt;/B&gt; &lt;BLOCKQUOTE&gt;&lt;P&gt;Security Reporting Center provides comprehensive reporting on security and Internet usage in your network. This highly flexible and scalable solution can help you understand security &amp;amp; bandwidth baselines, forecast and plan for firewall and bandwidth requirements, summarize critical and non-critical events on your network, manage employee Internet usage, and assess the activity that passes through your firewall. The following sections outline the key features and functions provided by this version. &lt;P&gt;&lt;B&gt;Proxy Reporting Module&lt;/B&gt;&lt;BR&gt;New in version 2.0, the Proxy Reporting module provides comprehensive, detailed analysis of Web traffic generated by users inside the network. Proxy reports show which pages, sites, and files users in the network accessed most frequently, which users generated the most Web traffic, and what content they viewed. The Proxy Reporting module analyzes log files from a wide variety of firewalls and proxy servers. &lt;P&gt;&lt;B&gt;Smart URL Categorization&lt;/B&gt;&lt;BR&gt;The Proxy Reporting module makes available comprehensive tracking of Web content through smart URL categorization. URL categorization checks the URLs your users visit against third-party SurfControl databases to identify sites with objectionable or time-wasting content. URL categorization also allows custom database creation and custom category mapping for focused reporting on Web usage issues. &lt;P&gt;&lt;B&gt;Improved Performance Management&lt;/B&gt;&lt;BR&gt;Security Reporting Center 2.0 offers a number of new customizations to help maximize performance and facilitate cross-platform installations, including the ability to: &lt;UL&gt;&lt;LI&gt;Limit the size of Content database tables &lt;LI&gt;Limit the memory consumed by each report table &lt;LI&gt;Customize FTP and DNS handling &lt;LI&gt;Choose how often to discard out-of-order log records &lt;LI&gt;Decide which computers analyze which log files by creating custom host groups &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;B&gt;Support for New Firewalls&lt;/B&gt;&lt;BR&gt;With version 2.0, Security Reporting Center adds support for Arkoon Network Security, CimTrak Web Security Edition, Fortinet FortiGate Network Protection Gateways, Lucent VPN Firewall, and CyberWALLPlus. &lt;P&gt;&lt;B&gt;Usability Enhancements&lt;/B&gt;&lt;BR&gt;Sample reports are now created during installation and accessible in a single click. Options have been reorganized for greater clarity. New orientation pages assist new users with reporting tasks. New Help site maps provide an organized list of all Help topics. &lt;P&gt;&lt;B&gt;MAPI E-mail Support&lt;/B&gt;&lt;BR&gt;Report distribution by e-mail now supports MAPI as well as SMTP. &lt;P&gt;&lt;B&gt;Log Path Macros&lt;/B&gt;&lt;BR&gt;New support for custom macros substitutes log paths with operating system-specific variables, enabling cross-platform log path specification. &lt;P&gt;&lt;B&gt;Local Filters&lt;/B&gt;&lt;BR&gt;New local filters enhance security by making custom data filters visible only to authorized users of a specific profile. &lt;P&gt;&lt;B&gt;Custom Currencies&lt;/B&gt;&lt;BR&gt;In addition to 43 preconfigured currencies, Security Reporting Center now supports user-configured currencies in bandwidth cost reporting. &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;Upgrading from Previous Versions&lt;/B&gt; &lt;BLOCKQUOTE&gt;&lt;P&gt;Please refer to the following knowledge base article for more detailed information. &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/article.aspx?id=10515"&gt;https://support.levelblue.com/kb/article.aspx?id=10515 &lt;/SPAN&gt;&lt;/A&gt;&lt;P&gt;&lt;B&gt;Backing up Databases&lt;/B&gt;&lt;BR&gt;We recommend backing up your databases before you attempt to upgrade from Firewall Reporting Center version 1.1 to Security Reporting Center version 2.0. Backing up the databases secures your data in case of a system failure during the upgrade. For example, if you lose power during an upgrade, your databases may be corrupted. To secure your data, copy it to a directory outside the installation directory. &lt;P&gt;&lt;B&gt;&lt;I&gt;Note:&lt;/I&gt;&lt;/B&gt; The following procedure has not been tested with versions earlier than version 1.1. &lt;OL&gt;&lt;LI&gt;Stop all Firewall Reporting Center program services. &lt;LI&gt;Copy the &lt;CODE&gt;&lt;I&gt;InstallDir&lt;/I&gt;/common/mysql/data&lt;/CODE&gt; directory to a location outside the installation directory. &lt;LI&gt;Install Security Reporting Center version 2.0. &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;B&gt;&lt;I&gt;Warning:&lt;/I&gt;&lt;/B&gt; Use the same database user name and password, and the same User Interface login name and password to install version 2.0 that you used to install version 1.1. If you use a new user name and password, the databases will not be accessible. &lt;P&gt;&lt;B&gt;To restore the databases and upgrade to version 2.0 after a failure during upgrade:&lt;/B&gt; &lt;OL&gt;&lt;LI&gt;Uninstall Security Reporting Center version 2.0. &lt;LI&gt;Reinstall Firewall Reporting Center version 1.1. &lt;P&gt;&lt;B&gt;&lt;I&gt;Warning:&lt;/I&gt;&lt;/B&gt; Use the same user name and password, and the same User Interface login name and password to install version 1.1 that you used to install version 2.0. If you use a new user name and password, the databases will not be accessible. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Stop all Firewall Reporting Center program services. &lt;LI&gt;Delete the &lt;CODE&gt;&lt;I&gt;InstallDir&lt;/I&gt;/common/mysql/data&lt;/CODE&gt; directory. &lt;LI&gt;Copy the saved &lt;CODE&gt;data&lt;/CODE&gt; folder from the folder where you installed it to the &lt;CODE&gt;&lt;I&gt;InstallDir&lt;/I&gt;/common/mysql&lt;/CODE&gt; directory. &lt;LI&gt;Restart the Firewall Reporting Center program services. &lt;LI&gt;Install Security Reporting Center version 2.0. &lt;/LI&gt;&lt;/OL&gt;&lt;/BLOCKQUOTE&gt;&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;Additions to Documentation&lt;/B&gt; &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;B&gt;Updates for Check Point Firewalls&lt;/B&gt;&lt;BR&gt;If you plan to use Security Reporting Center 2.0 with a Check Point firewall, use the instructions in the PDF version of the Firewall Configuration Guide found on the product CD-ROM or on the Marshal website. You should be aware of the following issues found in the print version and the Help files: &lt;UL&gt;&lt;LI&gt;When configuring Check Point FW-1 or VPN-1 with OPSEC LEA, use the updated instructions in the PDF version of the &lt;I&gt;Firewall Configuration Guide&lt;/I&gt; . These instructions reflect the fact that the NetIQ LEA Service for Security Reporting Center version 2.0 now uses the Check Point NG SDK. The instructions found in the print and Help versions of the &lt;I&gt;Firewall Configuration Guide&lt;/I&gt; refer to the Check Point FW-1 SDK, which was used with Firewall Reporting Center 1.1 and Firewall Suite. &lt;LI&gt;In the print version of the &lt;I&gt;Firewall Configuration Guide&lt;/I&gt;, the instructions for configuring Check Point NG contain an error. On page 15, Step 27 should read as follows: &lt;P&gt;Make sure that the &lt;CODE&gt;lea_server host&lt;/CODE&gt; value is the same as the IP address of the computer where the Check Point Management Server is installed. &lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;B&gt;Viewing Documentation Files&lt;/B&gt;&lt;BR&gt;The installation kit provides some documentation in PDF files. To view these documentation files, you need Adobe Acrobat or Adobe Acrobat Reader installed. You can download Adobe Acrobat Reader from the Adobe Web site (&lt;A class=solutionlink href="http://www.adobe.com/" target=_blank&gt;http://www.adobe.com/&lt;/A&gt;). &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;General Notes&lt;/B&gt; &lt;BLOCKQUOTE&gt;&lt;P&gt;Marshal strives to ensure our products provide quality solutions for your firewall security needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support (&lt;A href="mailto:support@marshal.com"&gt;support@marshal.com&lt;/A&gt;). &lt;P&gt;&lt;B&gt;Mapped Drives Not Supported for Windows XP&lt;/B&gt;&lt;BR&gt;If you have installed Security Reporting Center on Windows XP, and you need to specify a network drive for a log file path or a destination directory, do not use a mapped drive. Use the full UNC path to specify a network drive. &lt;P&gt;&lt;B&gt;Cisco PIX v6.1/v6.2 DNS Port Logging Issue&lt;/B&gt;&lt;BR&gt;Because an issue in Cisco PIX 6.1/6.2 causes it to log the DSN ID instead of the port number when logging the DNS source and destination port, Security Reporting Center sees an invalid value for the protocol and will consume large amounts of memory during log data analysis and export. To fix this problem, either upgrade to Cisco PIX v6.2.2 or use a Security Reporting Center Exclude filter to exclude traffic from your DNS servers. &lt;P&gt;&lt;B&gt;Check Point NG with OPSEC LEA Requires File Changes&lt;/B&gt;&lt;BR&gt;If you plan to collect Check Point NG logs using OPSEC LEA, and you previously used OPSEC LEA with Firewall Suite or Firewall Reporting Center, you must comment out modifications to the &lt;CODE&gt;fwopsec.conf&lt;/CODE&gt; file. The &lt;CODE&gt;fwopsec.conf&lt;/CODE&gt; file resides in the &lt;CODE&gt;winnt\FW1\NG\conf&lt;/CODE&gt; directory. Comment out all the lines in &lt;CODE&gt;fwopsec.conf&lt;/CODE&gt;. &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;Configuration Hints&lt;/B&gt; &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;B&gt;Configuring Distributed Installations&lt;/B&gt; &lt;P&gt;If you plan to install components of Security Reporting Center on multiple computers, then the Database component must be installed before all other components. &lt;/P&gt;&lt;P&gt;You must install the Database Server, the User Interface Server, and the Reporting agents in the same network environment. Each computer where a Security Reporting Center component is installed must be able to connect to the Database server. &lt;/P&gt;&lt;P&gt;For Security Reporting Center to work correctly on multiple computers, you must configure each component with the correct connection information when you install it. Install the Database server before you install any other components. When you install the Database server, you provide the host name, port number, user name, and password information for both the Database server and the User Interface server. Write this information down and provide the same information when you install components on other computers. &lt;/P&gt;&lt;P&gt;&lt;B&gt;Configuring Program Services&lt;/B&gt; &lt;P&gt;If you intend to use network drives to store resources such as log files, or if you have installed Security Reporting Center on multiple computers, you must manually configure Security Reporting Center services to access resources across the network. These services include the NetIQ Scheduler Agent, the NetIQ LEA Service, and the NetIQ Syslog Service. &lt;/P&gt;&lt;P&gt;You need to configure services if you will use a network location for any of the following purposes: &lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Retrieving log files &lt;LI&gt;Storing the FTP cache &lt;LI&gt;Storing uncompressed files &lt;LI&gt;Storing log files collected using Check Point with OPSEC LEA &lt;LI&gt;Storing log files collected using the NetIQ Syslog Service &lt;LI&gt;Storing static HTML or Word reports &lt;LI&gt;Storing FastTrends databases. &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;To ensure that product services can access network drives, first configure them to log on under an account with access rights to the drives you want to access. By default, product services are log on using the system account. To access mapped drives, you should typically configure the services to log on under a user account. This involves two steps: selecting an account to use for each service, and giving that account the appropriate rights. &lt;P&gt;&lt;B&gt;Configuring Services and User Rights&lt;/B&gt;&lt;BR&gt;Please refer to the following knowledge base article for further details. &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/article.aspx?id=10289"&gt;https://support.levelblue.com/kb/article.aspx?id=10289 &lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;Release notes for version 2.1 of Security Reporting Center can be found in the following knowledge base article: &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/article.aspx?id=10835"&gt;https://support.levelblue.com/kb/article.aspx?id=10835 &lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB13549&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 04:30:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>What are the release notes for Security Reporting Center 2.1?</title><link>https://support.levelblue.com/kb/Goto10835.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.1&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;What are the release notes for Security Reporting Center 2.1? &lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;This version of the Security Reporting Center product (Security Reporting Center) provides several new features. This version also improves usability and extends several capabilities. Many of these improvements were made in direct response to suggestions from our customers. We thank you for your time and valuable input. We hope you continue to help us ensure our products meet all your needs. &lt;P&gt;This document outlines why you should install this version, provides additions to the documentation, and identifies any known issues. We assume you are familiar with previous versions of this product under the name Firewall Reporting Center. For more information about installing Security Reporting Center, see the &lt;I&gt;Security Reporting Center User Guide&lt;/I&gt;.&lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;Why Install This Version?&lt;/B&gt; &lt;BLOCKQUOTE&gt;&lt;P&gt;Security Reporting Center provides comprehensive reporting on security and Internet usage in your network. This highly flexible and scalable solution can help you understand security and bandwidth baselines, forecast and plan for firewall and bandwidth requirements, summarize critical and non-critical events on your network, manage employee Internet usage, and assess the activity that passes through your firewall. The following sections outline the key features and functions provided by this version. &lt;P&gt;&lt;STRONG&gt;Reduction in Memory Usage&lt;/STRONG&gt; &lt;BR&gt;Customers with large installations will find in version 2.1, the Proxy Reporting module uses far less memory. This improvement in memory usage should be especially helpful to enterprises experiencing virus attacks and port scans. &lt;P&gt;&lt;STRONG&gt;Support for New Firewalls&lt;/STRONG&gt; &lt;BR&gt;With version 2.1, Security Reporting Center adds support for Clavister Firewall and Neoteris IVE. &lt;P&gt;&lt;STRONG&gt;Express Interface for Quick Report Access &lt;BR&gt;&lt;/STRONG&gt;A new Express interface makes report generation simple for new users. Event status panels now auto-refresh for convenient information updates. Icon legends provide a quick reference for navigating list panels. A unified tri-pane Help system adds a complete online table of contents for the User Guide and Firewall Configuration Guide plus indexing and full-text searching capability. &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;Upgrading from Previous Versions&lt;/B&gt; &lt;BLOCKQUOTE&gt;&lt;P&gt;To upgrade from previous versions, install the new version over an existing version. You do not need to uninstall your existing version. &lt;P&gt;If you have profiles that rely on a Check Point LEA connection, the lea.conf file must include an IP address. If the lea.conf file does not contain an IP address, we suggest deleting the LEA connection after upgrading and recreating it manually. &lt;P&gt;If you used custom images in your reports, upgrading to version 2.1 removes them from your reports. To restore the images, create a custom report style that uses the report images. For more information about report styles, see "Understanding Report Styles" in the User Guide for Security Reporting Center. &lt;P&gt;&lt;STRONG&gt;Upgrading from Version 2.x&lt;/STRONG&gt;&lt;BR&gt;To upgrade from version 2.x to 2.1, install Security Reporting Center over your existing installation.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Upgrading from Version 1.0b&lt;/STRONG&gt;&lt;BR&gt;To upgrade from version 1.0b, first upgrade to version 1.1, then to version 2.0c. When you upgrade from version 1.0b to version 1.1, all FastTrends and Content databases are deleted. However, the upgrade preserves all profiles, events, users, teams, and other configuration settings. &lt;/P&gt;&lt;P&gt;You cannot upgrade from a version earlier than version 1.0b. If you are using an earlier version of Firewall Reporting Center, you must uninstall it before installing Security Reporting Center. &lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Warning!&lt;/I&gt;&lt;/STRONG&gt;&lt;BR&gt;Use the same database user name and password, and the same User Interface login name and password to install the newer version that you used to install the earlier version. If you use a new user name and password, the databases will not be accessible and a clean installation will need to be performed. &lt;P&gt;&lt;B&gt;Backing up Databases&lt;/B&gt;&lt;BR&gt;We recommend backing up your databases before you attempt to upgrade from Firewall Reporting Center version 1.1 to Security Reporting Center version 2.0. Backing up the databases secures your data in case of a system failure during the upgrade. For example, if you lose power during an upgrade, your databases may be corrupted. To secure your data, copy it to a directory outside the installation directory. &lt;/P&gt;&lt;P&gt;&lt;B&gt;&lt;I&gt;Note:&lt;/I&gt;&lt;/B&gt; The following procedure has not been tested with versions earlier than version 1.1.  &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To back up databases before upgrading to version 2.1:&lt;/STRONG&gt; &lt;/P&gt;&lt;OL&gt;&lt;P&gt;&lt;LI&gt;Stop all Firewall or Security Reporting Center program services. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Copy the &lt;CODE&gt;InstallDir/common/mysql/data&lt;/CODE&gt; directory to a location outside the installation directory. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Install the new version of Security Reporting Center. &lt;P&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Warning!&lt;/I&gt;&lt;/STRONG&gt;&lt;BR&gt;Use the same database user name and password, and the same User Interface login name and password to install the newer version that you used to install the earlier version. If you use a new user name and password, the databases will not be accessible and a clean installation will need to be performed.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To restore databases and upgrade to version 2.1 after a failure during upgrade:&lt;/STRONG&gt; &lt;/P&gt;&lt;OL&gt;&lt;P&gt;&lt;LI&gt;Uninstall Security Reporting Center 2.1. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Reinstall the earlier version (Firewall Reporting Center 1.1 or Security Reporting Center 2.x). &lt;P&gt;&lt;B&gt;&lt;I&gt;Warning!&lt;/I&gt;&lt;/B&gt; Use the same database user name and password, and the same User Interface login name and password to install the newer version that you used to install the earlier version. If you use a new user name and password, the databases will not be accessible and a clean installation will need to be performed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Stop all Firewall or Security Reporting Center program services. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Delete the &lt;CODE&gt;InstallDir/common/mysql/data&lt;/CODE&gt; directory. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Copy the saved data folder from the folder where you installed it to the &lt;CODE&gt;InstallDir/common/mysql&lt;/CODE&gt; directory. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Restart the Firewall or Security Reporting Center program services. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Install Security Reporting Center version 2.1. &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;Upgrading User-Defined Databases from version 2.0a&lt;/STRONG&gt;&lt;BR&gt;If you are upgrading from version 2.0a, and you created a Content Database in the Proxy Reporting module using any location or settings other than the defaults, you need a special script to upgrade your MySQL database. &lt;/P&gt;&lt;P&gt;To upgrade the database, run the following script: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;InstallDir/common/sql_scripts/MySQL/Content/PXUpgrade/Update20ato20b.bat &lt;/CODE&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Use the following syntax on the command line: &lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;Upgrade20ato20b.bat username password dbname server &lt;/CODE&gt;&lt;P&gt;Where: &lt;BR&gt;&lt;CODE&gt;username&lt;/CODE&gt; is the username for the database &lt;BR&gt;&lt;CODE&gt;password&lt;/CODE&gt; is the password for the username &lt;BR&gt;&lt;CODE&gt;dbname&lt;/CODE&gt; is the name of the database &lt;BR&gt;&lt;CODE&gt;server&lt;/CODE&gt; is the name of the server where the database is saved &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/BLOCKQUOTE&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;Additions to Documentation&lt;/B&gt; &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;B&gt;Viewing Documentation Files&lt;/B&gt;&lt;BR&gt;The installation kit provides some documentation in PDF files. To view these documentation files, you need Adobe Acrobat or Adobe Acrobat Reader installed. You can download Adobe Acrobat Reader from the Adobe Web site (&lt;A class=solutionlink href="http://www.adobe.com/" target=_blank&gt;http://www.adobe.com/&lt;/A&gt;).&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;General Notes&lt;/B&gt; &lt;P&gt;Marshal strives to ensure our products provide quality solutions for your firewall security needs. The following issues are currently being researched. If you need further assistance with any issue, please contact Technical Support (&lt;A href="mailto:support@marshal.com"&gt;support@marshal.com&lt;/A&gt;). &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;STRONG&gt;Data Strings Truncated After 255 Characters&lt;/STRONG&gt; &lt;BR&gt;When data strings are identical up to 255 characters but become unique after 255 characters, Security Reporting Center truncates them before storing them in the Content database. Under these conditions, Proxy reports may contain inaccurate counts if they use data from the following Content database tables: CorePage, Download, FileExtension, GenPage, Page, and SearchKeyword. &lt;P&gt;&lt;STRONG&gt;Upgrades to LEA Connections&lt;/STRONG&gt;&lt;BR&gt;When you upgrade to version 2.1 from 2.0a or earlier, Security Reporting Center runs a script that populates the Check Point LEA Connections panel with your existing connections. If the &lt;CODE&gt;lea.conf&lt;/CODE&gt; file created for the earlier installation does not contain the IP address of the Check Point Management Server, or if the &lt;CODE&gt;lea.conf&lt;/CODE&gt; file uses an unfamiliar format, the upgrade substitutes a placeholder connection that does not work. Delete and recreate the connection manually to connect to the Check Point Management Server. This issue primarily affects connections for Check Point 4.x firewalls. &lt;P&gt;&lt;STRONG&gt;Number of Tasks Reset During Upgrade&lt;/STRONG&gt; &lt;BR&gt;When you upgrade to a new version, Security Reporting Center resets the number of concurrent tasks each agent can handle to the default, two tasks. If you used the Agent Settings panel to set the number of concurrent tasks to a value other than two, you must set it again after you upgrade. &lt;P&gt;&lt;STRONG&gt;Workaround for Gauntlet Date Logging&lt;/STRONG&gt;&lt;BR&gt;Because the year is not logged inside a Gauntlet log file, Security Reporting Center parses the year based on the name of the file. By default, Gauntlet uses one of the following date formats to name log files: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;messages.mm.dd.yyyy&lt;BR&gt;messages.dd.mm.yy &lt;/CODE&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;We strongly recommend that you use the default file names for your logs. If you use a file name other than the default, Security Reporting Center determines the year based on the current system date. This can lead to reporting errors. &lt;P&gt;&lt;STRONG&gt;Two MySQL Services&lt;/STRONG&gt;&lt;BR&gt;The current version of MySQL installs two services when you install the Security Reporting Center MySQL database on a Windows computer: the MySQL service and the NetIQ-MySQL service. Only the NetIQ-MySQL service is required to run Security Reporting Center. We recommend using the Services panel to set the Startup Type for the MySQL service to Disabled. &lt;P&gt;&lt;B&gt;Mapped Drives Not Supported for Windows XP&lt;/B&gt;&lt;BR&gt;If you have installed Security Reporting Center on Windows XP, and you need to specify a network drive for a log file path or a destination directory, do not use a mapped drive. Use the full UNC path to specify a network drive. &lt;P&gt;&lt;B&gt;Cisco PIX 6.1/6.2 DNS Port Logging Issue&lt;/B&gt;&lt;BR&gt;Because an issue in Cisco PIX 6.1/6.2 causes it to log the DSN ID instead of the port number when logging the DNS source and destination port, Security Reporting Center sees an invalid value for the protocol and will consume large amounts of memory during log data analysis and export. To fix this problem, either upgrade to Cisco PIX 6.2.2 or use a Security Reporting Center Exclude filter to exclude traffic from your DNS servers. &lt;P&gt;&lt;B&gt;Check Point NG with OPSEC LEA Requires File Changes&lt;/B&gt;&lt;BR&gt;If you plan to collect Check Point NG logs using OPSEC LEA, and you previously used OPSEC LEA with Firewall Suite or Firewall Reporting Center, you must comment out modifications to the &lt;CODE&gt;fwopsec.conf&lt;/CODE&gt; file. The &lt;CODE&gt;fwopsec.conf&lt;/CODE&gt; file resides in the &lt;CODE&gt;winnt\FW1\NG\conf&lt;/CODE&gt; directory. Comment out all lines in &lt;CODE&gt;fwopsec.conf&lt;/CODE&gt;.&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;Configuration Hints&lt;/B&gt; &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;B&gt;Configuring Distributed Installations&lt;/B&gt; &lt;P&gt;If you plan to install components of Security Reporting Center on multiple computers, then the Database component must be installed before all other components.&lt;/P&gt;&lt;P&gt;You must install the Database Server, the User Interface Server, and the Reporting agents in the same network environment. Each computer where a Security Reporting Center component is installed must be able to connect to the Database server.&lt;/P&gt;&lt;P&gt;For Security Reporting Center to work correctly on multiple computers, you must configure each component with the correct connection information when you install it. Install the Database server before you install any other components. When you install the Database server, you provide the host name, port number, user name, and password information for both the Database server and the User Interface server. Write this information down and provide the same information when you install components on other computers.&lt;/P&gt;&lt;P&gt;&lt;B&gt;Configuring Program Services&lt;/B&gt; &lt;P&gt;If you intend to use network drives to store resources such as log files, or if you have installed Security Reporting Center on multiple computers, you must manually configure Security Reporting Center services to access resources across the network. These services include the NetIQ Scheduler Agent, the NetIQ LEA Service, and the NetIQ Syslog Service.&lt;/P&gt;&lt;P&gt;You need to configure services if you will use a network location for any of the following purposes:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Retrieving log files &lt;LI&gt;Storing the FTP cache &lt;LI&gt;Storing uncompressed files &lt;LI&gt;Storing log files collected using Check Point with OPSEC LEA &lt;LI&gt;Storing log files collected using the NetIQ Syslog Service &lt;LI&gt;Storing static HTML or Word reports &lt;LI&gt;Storing FastTrends databases.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;To ensure that product services can access network drives, first configure them to log on under an account with access rights to the drives you want to access. By default, product services log on using the system account. To access mapped drives, you should typically configure the services to log on under a user account. This involves two steps: selecting an account to use for each service, and giving that account the appropriate rights. &lt;P&gt;&lt;B&gt;Configuring Services and User Rights&lt;/B&gt;&lt;BR&gt;Please refer to the following knowledge base article for further details. &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/article.aspx?id=10289"&gt;https://support.levelblue.com/kb/article.aspx?id=10289 &lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;Information about system requirements can be found in the following knowledge base article: &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/article.aspx?id=10842"&gt;https://support.levelblue.com/kb/article.aspx?id=10842 &lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB38167&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 04:29:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>How do I upgrade to Security Reporting Center?</title><link>https://support.levelblue.com/kb/Goto10515.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.0&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I upgrade to Security Reporting Center? &lt;P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;The features and functionality of WebTrends Firewall Reporting Center have been incorporated into Security Reporting Center, beginning with release 2.0.  If you are currently licensed with WebTrends Firewall Reporting Center and have a current support plan, you are eligible to upgrade to Security Reporting Center.   &lt;P&gt;&lt;B&gt;&lt;I&gt;Important Note:&lt;/I&gt;&lt;/B&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Upgrades to release 2.0 are only supported if you currently have release 1.1 installed. &lt;/LI&gt;&lt;P&gt;&lt;LI&gt;&lt;B&gt;Release 1.0 is currently installed&lt;/B&gt;&lt;BR&gt;Upgrades to any later release is not supported. Changes have been made to the database schema which prevents clean upgrades, and current upgrade scripts do not account for this version. Release 1.0 must first be uninstalled before a later release can be installed. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;&lt;B&gt;Release 1.0b is currently installed&lt;/B&gt;&lt;BR&gt;An upgrade to 1.1 is possible, but with a caveat. While all configured profiles, options, events, users, and teams will upgrade successfully, FastTrends and Content databases will be deleted in the upgrade process. This is due to changes in the database schema. The only possible upgrade path from 1.0b is to 1.1. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;&lt;B&gt;Release 1.1 is currently installed&lt;/B&gt;&lt;BR&gt;An upgrade to release 2.0 is fully supported through database scripting. The only release of any product that can be upgraded to NetIQ Security Reporting Center 2.0 is WebTrends Firewall Reporting Center 1.1. &lt;BR&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;B&gt;To see if you are eligible to upgrade, check for an installed subscription.&lt;/B&gt; &lt;OL&gt;&lt;P&gt;&lt;LI&gt;From within your current installation, click the &lt;B&gt;Help&lt;/B&gt; menu, and then click &lt;B&gt;About...&lt;/B&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Look for a &lt;B&gt;Subscription expires in...&lt;/B&gt; section. If the expiration date has lapsed, you need to renew your support plan. If there is not &lt;B&gt;Subscription expires in...&lt;/B&gt; section, then a support plan was not installed. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;If a support plan has not been installed, please contact Marshal for purchase information.&lt;/LI&gt;&lt;/OL&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;&lt;I&gt;Note:&lt;/B&gt;&lt;/I&gt; If you install an upgrade without an active support plan, the product will install as a trial and will disable in 14 days. &lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;B&gt;To upgrade to Security Reporting Center, follow these steps.&lt;/B&gt; &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Back-up your existing installation - &lt;B&gt;Do not skip this step!&lt;/B&gt; &lt;P&gt;When you upgrade your software, the upgrade will offer to save a copy of your existing program directory. If the computer where the product is installed does not have enough disk space for a full back-up, you must make a back-up manually before attempting the upgrade. NetIQ recommends that you store this back-up somewhere on your internal network, so it will be available to you if needed. Be sure to back up the entire program directory! &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Check for an installed subscription (instructions provided above). &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Download the upgrade product from the following location (&lt;STRONG&gt;Note&lt;/STRONG&gt;:&lt;STRONG&gt; A valid customer login is required to access this page&lt;/STRONG&gt;): &lt;P&gt;&lt;U&gt;&lt;FONT color=#0000ff&gt;&lt;A href="https://support.levelblue.com/Security-Reporting-Center/Upgrade.asp"&gt;https://support.levelblue.com/Security-Reporting-Center/Upgrade.asp&lt;/A&gt;&lt;/FONT&gt;&lt;/U&gt; &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Following the installation instructions provided in the following knowledge base article. &lt;UL&gt;&lt;P&gt;&lt;LI&gt;To install on Microsoft Windows: &lt;P&gt;&lt;A href="https://support.levelblue.com/kb/article.aspx?id=10386"&gt;https://support.levelblue.com/kb/article.aspx?id=10386&lt;/A&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB13495&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 04:11:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>How do I manually uninstall Security Reporting Center?</title><link>https://support.levelblue.com/kb/Goto10404.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.x&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I manually uninstall Security Reporting Center? &lt;P&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Unable to uninstall Security Reporting Center.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;&lt;B&gt;To uninstall from Windows:&lt;/B&gt; &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Does the program appear in &lt;B&gt;Add/Remove Programs&lt;/B&gt; of the Control Panel? &lt;UL&gt;&lt;LI&gt;If yes, then attempt to uninstall using this feature. &lt;LI&gt;If no, go to step 4. &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Go to your system temp directory and delete all files and folders found there. &lt;UL&gt;&lt;LI&gt;Try running &lt;B&gt;Add/Remove Programs&lt;/B&gt; again. &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;From a command line prompt, run the following command, without brackets: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;MsiExec.exe /I{InsertProductVersionCodeHere}&lt;/CODE&gt; &lt;P&gt;[The product version code can be found further below.] &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;In the application Services, stop any of the following services that are running: &lt;UL&gt;&lt;LI&gt;NetIQ - Apache &lt;LI&gt;NetIQ - MySQL &lt;LI&gt;NetIQ - Tomcat &lt;LI&gt;NetIQ LEA Service &lt;LI&gt;NetIQ Scheduler Agent &lt;LI&gt;NetIQ Syslog Service &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;From a command line prompt, run MsiZap.exe with the following command, without brackets: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;MsiZap.exe T {InsertProductVersionCodeHere}&lt;/CODE&gt; &lt;P&gt;[The product version code and information about MsiZap can be found further below.] &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Delete the directory that Security Reporting Center or Firewall Reporting Center is installed to. By default, this is C:\Program Files\NetiQ\Security Reporting Center. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Open the Registry Editor. Delete HKEY_LOCAL_MACHINE\SOFTWARE\WebTrends Corporation\InstalledApps. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;In the Registry Editor, delete the following keys: &lt;UL&gt;&lt;LI&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WebTrends LEA Daemon &lt;LI&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WebTrends Scheduler Agent &lt;LI&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WebTrends Syslog Daemon &lt;LI&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WTApacheService &lt;LI&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WTMySQLService &lt;LI&gt;HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\WTTomcatService &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Open the directory c:\Winnt\Installer. You will probably see multiple *.msi files. Right click one of the files, select &lt;B&gt;Properties&lt;/B&gt;, and select the &lt;B&gt;Summary&lt;/B&gt; tab. Looking for a .msi file that, in this tab, has "Security Reporting Center" as the value for the Subject. When you find this file, delete it. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Restart the machine.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;Product Version Codes: &lt;P&gt;Firewall Reporting Center: &lt;UL&gt;&lt;P&gt;&lt;LI&gt;Version 1.0 - {7C5A8DB2-D8BC-472B-B7A2-1347BB9EF935} &lt;LI&gt;Version 1.0b - {06299D71-9A45-4249-9025-FE8E243004E5} &lt;LI&gt;Version 1.1 - {7D5BE4FF-D34D-434C-9241-4ECD46D55AC9} &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Security Reporting Center &lt;UL&gt;&lt;P&gt;&lt;LI&gt;Version 2.0 - {4C2D3F7F-3ACF-4C8C-8D0C-3C9AB7F7C322} &lt;LI&gt;Version 2.0a - {4353C5AD-F2B3-4C27-B7A0-7F851469992B} &lt;LI&gt;Version 2.0b - {B19C4CA6-40AF-4555-A403-48744D8CD44D} &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;To obtain MSIZap, see the following Microsoft Knowledge Base article:&lt;/P&gt;&lt;P&gt;&lt;A href="http://support.microsoft.com/?scid=kb;en-us;290301"&gt;http://support.microsoft.com/?scid=kb;en-us;290301&lt;/A&gt;: Description of the Windows Installer CleanUp Utility&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB17366&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 03:27:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>How do I implement Security Reporting Center so that it uses a secure connection?</title><link>https://support.levelblue.com/kb/Goto10359.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.1&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;How do I implement Security Reporting Center so that it uses a secure connection? &lt;LI&gt;Can Security Reporting Center use an SSL connection?&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;&lt;STRONG&gt;SSL Overview&lt;/STRONG&gt; &lt;P&gt;Web clients and Web servers often transmit sensitive information.  Protecting this information is typically accomplished by sending the data in an encrypted form and subsequently decrypting the data on the receiving side. The Secure Sockets Layer (SSL) protocol provides several features that enable secure transmission of Web traffic. These features include data encryption, server authentication, and message integrity.  To enable secure communication from Web clients to Security Reporting Center using SSL, you must first enable SSL support.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Important Note:&lt;/I&gt;&lt;/STRONG&gt;&lt;BR&gt;The information provided in this document describes how to enable basic SSL functionality and generate certificates. Depending on your network configuration and security needs, you may need to consult outside documentation. For advanced configuration concerns, refer to the SSL resources at:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;A class=solutionlink href="http://www.apache.org/" target=_blank&gt;http://www.apache.org/&lt;/A&gt;&lt;BR&gt;&lt;A class=solutionlink href="http://www.modssl.org/" target=_blank&gt;http://www.modssl.org/&lt;/A&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;STRONG&gt;SSL Installation Instructions&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;P&gt;&lt;LI&gt;&lt;B&gt;New Installations&lt;/B&gt;&lt;BR&gt;Install Security Reporting Center as described in the User Guide. By default, SSL is enabled for Windows installations. &lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;&lt;B&gt;Upgrade Installations&lt;/B&gt;&lt;BR&gt;To install Security Reporting Center on top of an existing installation, use the steps described in the Release Notes. When you upgrade to version 2.1 from Security Reporting Center 2.0x, the upgrade process backs up your existing Apache Web server and installs a new instance of Apache. &lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;&lt;B&gt;SSL Enabled Prior to Upgrade&lt;/B&gt;&lt;BR&gt;If your original installation had SSL enabled, and you want to continue using SSL, manually copy your existing SSL certificate from your old Apache installation to the new Apache installation. Your original Apache installation now resides in the installation &lt;CODE&gt;directory\common\Apache version number&lt;/CODE&gt; folder of your Security Reporting Center installation. &lt;P&gt;&lt;/P&gt;&lt;P&gt;To copy your certificate:&lt;/P&gt;&lt;OL&gt;&lt;P&gt;&lt;LI&gt;Copy the SSL .key certificate file from the &lt;CODE&gt;conf\ssl.key&lt;/CODE&gt; directory of your old Apache installation into the &lt;CODE&gt;conf\ssl.key&lt;/CODE&gt; directory of your new Apache installation. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Open the installation &lt;CODE&gt;directory\common\apache\conf\httpd.conf&lt;/CODE&gt; file in your new Apache installation, and edit the &lt;CODE&gt;SSLCertificateKeyFile&lt;/CODE&gt; entry to point to the correct &lt;CODE&gt;.key&lt;/CODE&gt; file. &lt;P&gt;&lt;B&gt;Note:&lt;/B&gt; This entry is absent if SSL is disabled.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Open the installation &lt;CODE&gt;directory\common\apache\conf\httpd_with_ssl.conf.template&lt;/CODE&gt; file in your new Apache installation and edit the &lt;CODE&gt;SSLCertificateKeyFile&lt;/CODE&gt; entry to point to the correct &lt;CODE&gt;.key&lt;/CODE&gt; file. &lt;P&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;&lt;B&gt;SSL Disabled Prior to Upgrade&lt;/B&gt;&lt;BR&gt;If SSL was disabled in the original installation and you want to enable it, follow these steps: &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Obtain an SSL certificate. For more information, see section 4 of the User Guide, "&lt;I&gt;Installing Your own Certificate&lt;/I&gt;." &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Use the SSL options in the Security Reporting Center user interface to enable SSL. For more information, see section 3 of the User Guide, "&lt;I&gt;Enabling and Disabling SSL&lt;/I&gt;." &lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;STRONG&gt;Enabling and Disabling SSL&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Security Reporting Center 2.1 provides the ability to enable or disable SSL as a feature of the user interface. &lt;/P&gt;&lt;P&gt;To enable or disable SSL, follow these steps: &lt;/P&gt;&lt;OL&gt;&lt;P&gt;&lt;LI&gt;Open the Administration module and click &lt;B&gt;Options&lt;/B&gt; | &lt;B&gt;SSL&lt;/B&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Click &lt;B&gt;Enable SSL&lt;/B&gt; or &lt;B&gt;Disable SSL&lt;/B&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Restart the &lt;B&gt;NetIQ Apache Service&lt;/B&gt; and the &lt;B&gt;NetIQ Tomcat Service&lt;/B&gt;. &lt;/LI&gt;&lt;/OL&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;With SSL enabled, the URL for connecting to Security Reporting Center takes the following format: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;https://hostname:9000/index.html &lt;/CODE&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;With SSL disabled, the URL format is the following: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;http://hostname:9000/index.html&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;When you enable or disable SSL, Security Reporting Center automatically updates any local Windows shortcuts pointing to the old URL.&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB38143&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 03:26:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>Error: "java.lang.OutOfMemory"</title><link>https://support.levelblue.com/kb/Goto10137.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite 4.1x&lt;/LI&gt;&lt;LI&gt;Security Reporting Center 2.X&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Error: "java.lang.OutOfMemory" &lt;LI&gt;Out of memory errors are received when trying to view reports.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;The Java component does not allocating enough memory for reports with large amounts of data to load successfully. &lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;For the report to display successfully, allocate more memory to Java. To do this please follow the steps below: &lt;P&gt;&lt;B&gt;&lt;I&gt;Important Note!&lt;/I&gt;&lt;/B&gt; Before making any changes, please make a backup of your registry. &lt;BR&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;STRONG&gt;Allocating Java memory on Windows:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;P&gt;&lt;LI&gt;Open the Registry Editor by running the regedit command. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Navigate to the following entry: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;HKEY_LOCAL_MACHINE/SYSTEM/CurrentControlSet/Services/NetIQTomcatService/Parameters&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Add two new strings: &lt;UL&gt;&lt;P&gt;&lt;LI&gt;JVM Option Number 2&lt;BR&gt;value: -Xms10M &lt;P&gt;&lt;/P&gt;&lt;LI&gt;JVM Option Number 3&lt;BR&gt;value: -Xmx500M &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Change the "JVM Option Count" parameter from 2 to 4, because we have added two new parameters. Without making this change, the memory will not be affected. &lt;BR&gt;&lt;LI&gt;Restart the NetIQ Apache and NetIQ Tomcat services in Service Control Manager.&lt;/LI&gt;&lt;/OL&gt;&lt;BLOCKQUOTE dir=ltr style="MARGIN-RIGHT: 0px"&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT color=#ff0000&gt;Warning:&lt;/FONT&gt;&lt;/STRONG&gt; Using the Registry Editor incorrectly can cause serious problems that may require you to reinstall your operating system. Trustwave cannot guarantee that problems resulting from the incorrect use of Registry Editor can be resolved. Make sure that you backup your Registry prior to making any changes. &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB35391&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 03:23:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>How do I change the database user name and password in Security Reporting Center modules?</title><link>https://support.levelblue.com/kb/Goto10252.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.0 &lt;LI&gt;Security Reporting Center 2.1&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I change the database user name and password in Security Reporting Center modules? &lt;P&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;When you wish to change the database user name and password in Security Reporting Center, changes to multiple files must be completed so that the User Interface, Scheduler Agent, LEA Service, and Syslog Service can properly log in. &lt;P&gt;To change the user name and password, please follow these directions for each module. (You must stop and restart each of the services for the changes to take effect.  This will also ensure that the new passwords are encrypted.) &lt;UL&gt;&lt;P&gt;&lt;LI&gt;&lt;B&gt;NetIQ Scheduler Agent&lt;/B&gt; &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Using any text editor, open the &lt;CODE&gt;agent.conf&lt;/CODE&gt; file from the &lt;CODE&gt;\modules\agent&lt;/CODE&gt; directory. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Under the &lt;CODE&gt;[ConfigDB]&lt;/CODE&gt; section, locate the entry for &lt;CODE&gt;username&lt;/CODE&gt; and an entry for &lt;CODE&gt;password&lt;/CODE&gt;.   &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Delete the existing encrypted user name and password from each of these entries. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Type the new user name and password following the equal sign. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Save and close the file. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Stop and restart the &lt;B&gt;NetIQ - Scheduler Agent&lt;/B&gt; service by clicking &lt;B&gt;Start&lt;/B&gt; | &lt;B&gt;Settings&lt;/B&gt; | &lt;B&gt;Control Panel&lt;/B&gt; | &lt;B&gt;Administrative Tools&lt;/B&gt; | &lt;B&gt;Services&lt;/B&gt;. &lt;/LI&gt;&lt;/OL&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;&lt;B&gt;NetIQ LEA Service&lt;/B&gt; &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Using any text editor, open the &lt;CODE&gt;lea_service.ini &lt;/CODE&gt;file from &lt;CODE&gt;\modules\leaservice&lt;/CODE&gt; directory. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Under the &lt;CODE&gt;[LEA_Service]&lt;/CODE&gt; section, locate an entry for &lt;CODE&gt;configDb_UserName&lt;/CODE&gt; and an entry for &lt;CODE&gt;configDb_UserPassword&lt;/CODE&gt;.  &lt;P&gt;&lt;B&gt;&lt;I&gt;Note:&lt;/I&gt;&lt;/B&gt; Do not change the &lt;CODE&gt;configDb_DSN&lt;/CODE&gt; entry. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Delete the existing encrypted user name and password from each of these entries. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Type the new user name and password following the equal sign. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Save and close the file. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Stop and restart the &lt;B&gt;NetIQ - LEA Service&lt;/B&gt; service by clicking &lt;B&gt;Start&lt;/B&gt; | &lt;B&gt;Settings&lt;/B&gt; | &lt;B&gt;Control Panel&lt;/B&gt; | &lt;B&gt;Administrative Tools&lt;/B&gt; | &lt;B&gt;Services&lt;/B&gt;. &lt;/LI&gt;&lt;/OL&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;&lt;B&gt;NetIQ Syslog Service&lt;/B&gt; &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Using any text editor, open the &lt;CODE&gt;syslog_service.ini &lt;/CODE&gt;file from the &lt;CODE&gt;\modules\syslogservice&lt;/CODE&gt; directory. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Under the &lt;CODE&gt;[SYSLOG_Service]&lt;/CODE&gt; section locate an entry for &lt;CODE&gt;configDb_UserName&lt;/CODE&gt; and an entry for &lt;CODE&gt;configDb_UserPassword&lt;/CODE&gt;.  &lt;P&gt;&lt;B&gt;&lt;I&gt;Note:&lt;/I&gt;&lt;/B&gt; Do not change the &lt;CODE&gt;configDb_DSN&lt;/CODE&gt; entry. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Delete the existing encrypted user name and password from each of these entries. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Type the new user name and password following the equal sign. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Save and close the file. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Stop and restart the &lt;B&gt;NetIQ - Syslog Service&lt;/B&gt; service by clicking &lt;B&gt;Start&lt;/B&gt; | &lt;B&gt;Settings&lt;/B&gt; | &lt;B&gt;Control Panel&lt;/B&gt; | &lt;B&gt;Administrative Tools&lt;/B&gt; | &lt;B&gt;Services&lt;/B&gt;. &lt;/LI&gt;&lt;/OL&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;&lt;B&gt;User Interface&lt;/B&gt; &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Open the &lt;CODE&gt;web.xml &lt;/CODE&gt;file from the &lt;CODE&gt;\common\uiserver\WEB-INF&lt;/CODE&gt; directory. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Find the &lt;CODE&gt;&amp;lt;param-name&amp;gt;&lt;/CODE&gt; entry, &lt;CODE&gt;WtSchedJdbcUsername&lt;/CODE&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Change the encrypted &lt;CODE&gt;&amp;lt;param-value&amp;gt;&lt;/CODE&gt; to the new user name. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Find the &lt;CODE&gt;&amp;lt;param-name&amp;gt;&lt;/CODE&gt; entry, &lt;CODE&gt;WtSchedJdbcPassword&lt;/CODE&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Change the encrypted &lt;CODE&gt;&amp;lt;param-value&amp;gt;&lt;/CODE&gt; to the new password. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Find the &lt;CODE&gt;&amp;lt;param-name&amp;gt;&lt;/CODE&gt; entry, &lt;CODE&gt;WtSchedJdbcEncrypted&lt;/CODE&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Change the &lt;CODE&gt;&amp;lt;param-value&amp;gt;&lt;/CODE&gt; to &lt;CODE&gt;false&lt;/CODE&gt;. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Save and close the file. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Stop and restart the &lt;B&gt;NetIQ - Tomcat&lt;/B&gt; service by clicking &lt;B&gt;Start&lt;/B&gt; | &lt;B&gt;Settings&lt;/B&gt; | &lt;B&gt;Control Panel&lt;/B&gt; | &lt;B&gt;Administrative Tools&lt;/B&gt; | &lt;B&gt;Services&lt;/B&gt;. &lt;/LI&gt;&lt;/OL&gt;&lt;BR&gt;&lt;BR&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;P&gt;Changing the MySQL database user name and password is not done through Security Reporting Center.  Instead, this action should be done via MySQL. &lt;P&gt;A number of free GUI tools for MySQL administration are available. MySQL can also be administered from the command line. &lt;P&gt;The tool maintained by MySQL AB is available at the following URL: &lt;A href="http://dev.mysql.com/downloads/gui-tools/"&gt;http://dev.mysql.com/downloads/gui-tools/&lt;/A&gt;&lt;/P&gt;&lt;BLOCKQUOTE dir=ltr style="MARGIN-RIGHT: 0px"&gt;&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; SRC uses an older version of MySQL, so you may see a warning about version mismatch. &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;MySQL-Front, a well-known GUI tool, is no longer available.&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB14395&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 03:22:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>How does OPSEC LEA connectivity work in Security Reporting Center?</title><link>https://support.levelblue.com/kb/Goto10550.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.0&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How does OPSEC LEA connectivity work in Security Reporting Center? &lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;Checkpoint firewalls maintain two binary log event databases on the firewall or management console, the &lt;B&gt;standard database&lt;/B&gt; and the &lt;B&gt;accounting database&lt;/B&gt;. These databases record traffic according to the firewall rule set. Marshal provides a method of connecting to this log database and downloading the log files in a format that Security Reporting Center can read. &lt;P&gt;The database connectivity is provided by a secondary process that uses the Checkpoint-developed OPSEC LEA interface. Security Reporting Center starts a secondary process (&lt;CODE&gt;lea_service.exe&lt;/CODE&gt; for Windows) upon creation of a profile that is configured to use OPSEC LEA. &lt;P&gt;Once the LEA process is started, it connects to the firewall on TCP port 18184 and continuously polls the firewall for new log record data. This process is fault tolerant in that it records its last-known position in the database. Because of this, Security Reporting Center is capable of reconnecting to the firewall and resuming transfer of log records in the case of communication failure. If the LEA connection is dropped for any reason, the process will attempt to re-connect every five minutes. &lt;P&gt;The LEA process writes the contents of the two databases to a location that you specify when the profile is configured.&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB13427&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 03:20:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>How do I export Check Point log files?</title><link>https://support.levelblue.com/kb/Goto10346.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.x &lt;LI&gt;WebTrends Firewall Suite 4.x &lt;LI&gt;Check Point Firewall-1 &lt;LI&gt;Check Point NG&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I export Check Point log files? &lt;P&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Unable to analyze Check Point exported log files.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;P&gt;&lt;B&gt;To export Check Point FW-1 log files, follow these steps.&lt;/B&gt; &lt;OL&gt;&lt;P&gt;&lt;LI&gt;From the machine on which the firewall is installed, access a command prompt. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Change to the directory where the &lt;CODE&gt;fw.exe&lt;/CODE&gt; file is located. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Enter the following text to export the &lt;CODE&gt;fw.log&lt;/CODE&gt; log files. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;fw logexport -d ; -i fw.log -o[log_path]\fw.log&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Enter the following text to export the &lt;CODE&gt;fw.alog&lt;/CODE&gt; log files. &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;fw logexport -d ; i fw.alog -o [log_path]\fw.alog&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;To export Check Point NG log files, follow these steps:&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;P&gt;&lt;LI&gt;On the computer where the firewall is installed, open a command prompt. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Switch to the &lt;STRONG&gt;\winnt\fw1\NG\bin&lt;/STRONG&gt; directory where the &lt;CODE&gt;fw.exe&lt;/CODE&gt; file is located. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Export the log files using the following command: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;fwm logexport -i &amp;lt;input file&amp;gt; -o &amp;lt;output file&amp;gt;&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;STRONG&gt;Note: &lt;/STRONG&gt; If you do not specify an input file Check Point exports the current log. &lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Check Point NG does not produce an &lt;FONT face="Courier New"&gt;.alog&lt;/FONT&gt; file.  This information is now combined into the regular &lt;FONT face="Courier New"&gt;.log&lt;/FONT&gt; file.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB5691&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 03:19:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>Error: 'No such file or directory: getpwuid: couldn't determine user name from uid &lt;Value&gt;, you probably need to modify the User directive.'</title><link>https://support.levelblue.com/kb/Goto10106.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.1&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Error: 'No such file or directory: getpwuid: couldn't determine user name from uid &amp;lt;Value&amp;gt;, you probably need to modify the User directive.' &lt;LI&gt;Cannot start the Apache process.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Information:&lt;/H2&gt;To resolve this issue, complete the following steps: &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Navigate to the following directory: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;&amp;lt;SRCInstallDir&amp;gt;/common/apache/conf&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Open the &lt;CODE&gt;httpd.conf&lt;/CODE&gt; file. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Find the following line: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;LoadModule userdir_module modules/mod_userdir.so&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Comment out this line by adding a pound (#) sign in front of the line so that it reads: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;#LoadModule userdir_module modules/mod_userdir.so&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Repeat steps 3 and 4, and modify the following files: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;&amp;lt;SRCInstallDir&amp;gt;/common/apache/conf/httpd_with_ssl.conf.template&lt;BR&gt;&amp;lt;SRCInstallDir&amp;gt;/common/apache/conf/httpd_without_ssl.conf.template&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Restart the Tomcat and Apache processes by running the following commands from the &lt;CODE&gt;&amp;lt;SRCInstallDir&amp;gt;/common/bin&lt;/CODE&gt; directory: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;./stopallui.src&lt;BR&gt;./startallui.src&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Launch Security Reporting Center. &lt;/LI&gt;&lt;/OL&gt;&lt;BR&gt;&lt;BR&gt;&lt;P&gt;If this does not resolve the issue, configure User and Group directives.  To do this, please follow the steps below:&lt;/P&gt;&lt;OL&gt;&lt;P&gt;&lt;LI&gt;Open the &lt;CODE&gt;httpd.conf&lt;/CODE&gt; file. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;At the bottom of the file, add the following lines: &lt;P&gt;&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;User nobody&lt;BR&gt;Group nobody&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Save the file. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Repeat step 2, modifying the following files: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;&amp;lt;SRCInstallDir&amp;gt;/common/apache/conf/httpd_with_ssl.conf.template&lt;BR&gt;&amp;lt;SRCInstallDir&amp;gt;/common/apache/conf/httpd_without_ssl.conf.template &lt;/CODE&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Restart the Tomcat and Apache processes by running the following commands from the &lt;CODE&gt;&amp;lt;SRCInstallDir&amp;gt;/common/bin&lt;/CODE&gt; directory: &lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;CODE&gt;./stopallui.src&lt;BR&gt;./startallui.src&lt;/CODE&gt; &lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&lt;/P&gt;&lt;LI&gt;Launch Security Reporting Center. &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB39030&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 03:09:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>What are the new features in Security Reporting Center 2.0a?</title><link>https://support.levelblue.com/kb/Goto10833.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.0a&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;What are the new features in Security Reporting Center 2.0a? &lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;For a complete list of Security Reporting Center features, please see the following knowledge base article, which includes release notes for version 2.0: &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/article.aspx?id=10834"&gt;Q10834&lt;/A&gt;: What are the release notes for Security Reporting Center 2.0? &lt;H3&gt;New features:&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;B&gt;Enhanced Performance:&lt;/B&gt;  Version 2.0a provides several speed and performance improvements for users who analyze large amounts of data. Security Reporting Center now prevents lockups during large-scale analysis by dynamically limiting table size when memory usage reaches 90%. &lt;P&gt;&lt;/P&gt;&lt;LI&gt;Support for &lt;B&gt;Cisco PIX 6.2&lt;/B&gt; and &lt;B&gt;Borderware 6.5a&lt;/B&gt; log files have been added. &lt;P&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;To learn more about how to analyze a log file from a Cisco PIX 6.2/6.3 firewall, please refer to the following knowledge base article: &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/article.aspx?id=10450"&gt;Q10450&lt;/A&gt;: How do I run reports for a Cisco Pix 6.2/6.3 log file?&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB25861&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 03:01:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>What are the system requirements for Security Reporting Center 2.0?</title><link>https://support.levelblue.com/kb/Goto10841.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.0&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;What are the system requirements for Security Reporting Center 2.0? &lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;&lt;B&gt;Microsoft Windows Requirements&lt;/B&gt; &lt;P&gt;The following table shows the requirements for Microsoft Windows computers. &lt;P&gt;&lt;TABLE cellPadding=5 border=1&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="40%"&gt;&lt;B&gt;&lt;FONT size=2&gt;Component&lt;/FONT&gt;&lt;/B&gt;&lt;/TD&gt;&lt;TD width="60%"&gt;&lt;B&gt;&lt;FONT size=2&gt;Minimum Requirements&lt;/FONT&gt;&lt;/B&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;Processor&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Dual Pentium III 733 MHz or higher&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;Disk Space&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;1GB free disk space. SCSI recommended.&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;RAM&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;1GB&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;Operating System&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Microsoft Windows NT 4.0 with Service Pack 4.0 or higher&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;Database Application&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;MySQL&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;Browser&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Microsoft Internet Explorer 4.x or higher, or&lt;BR&gt;Netscape 4.5 or higher &lt;/FONT&gt;&lt;P&gt;&lt;FONT size=2&gt;Reports rely on Java, which is installed with most browsers. However, Java support is not included by default when installing Netscape 6.0 or Netscape 6.1. If you use either of these browsers, make sure you also install Java.&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;P&gt;Multiple CPUs are recommended for large numbers of profiles and/or users. More disk space and memory is needed to analyze large log files. Also, it is best to install Security Reporting Center on a separate, dedicated system which has access to all of the log files.&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB13364&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 02:52:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>What are the system requirements for Security Reporting Center 2.1?</title><link>https://support.levelblue.com/kb/Goto10842.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.1&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;What are the system requirements for Security Reporting Center 2.1? &lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;&lt;B&gt;Microsoft Windows Requirements&lt;/B&gt; &lt;P&gt;The following table shows the requirements for Microsoft Windows computers. &lt;P&gt;&lt;TABLE cellPadding=5 border=1&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="40%"&gt;&lt;B&gt;&lt;FONT size=2&gt;Component&lt;/FONT&gt;&lt;/B&gt;&lt;/TD&gt;&lt;TD width="60%"&gt;&lt;B&gt;&lt;FONT size=2&gt;Minimum Requirements&lt;/FONT&gt;&lt;/B&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;Processor&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT size=2&gt;Pentium III 733 MHz or higher&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size=2&gt;&lt;STRONG&gt;Recommended:&lt;/STRONG&gt; Dual Pentium IV for typical installations.&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;Disk Space&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;1GB free disk space. SCSI recommended.&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;RAM&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;1GB&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;Operating System&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Microsoft Windows 2000, Microsoft Windows XP, Microsoft Windows 2003&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;Database Application&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;MySQL (installed by default with the application)&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;Browser&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Microsoft Internet Explorer 5.x or higher, or Netscape 6.x or higher.  Netscape 6.0 is not supported.  &lt;P&gt;Reports rely on Java, which is installed with most browsers. However, Java support is not included by default when installing Netscape 6.1 or in some late versions of Internet Explorer. If you use either of these browsers, make sure you also install Java.&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;&lt;P&gt;Multiple CPUs are recommended for large numbers of profiles and/or users. More disk space and memory is needed to analyze large log files. Also, it is best to install Security Reporting Center on a separate, dedicated system which has access to all of the log files.&lt;/P&gt;&lt;P&gt;Release notes information can be found in the following knowledge base article: &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/article.aspx?id=q10835"&gt;Q10835&lt;/A&gt;: What are the release notes for Security Reporting Center 2.1?&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB38166&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 02:51:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>What components are installed with Security Reporting Center?</title><link>https://support.levelblue.com/kb/Goto10848.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.0 &lt;LI&gt;Security Reporting Center 2.1&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;What components are installed with Security Reporting Center? &lt;P&gt;&lt;H2&gt;Information:&lt;/H2&gt;&lt;P&gt;During a complete installation process, six major components are installed on the computer. &lt;UL&gt;&lt;P&gt;&lt;LI&gt;Apache &lt;LI&gt;MySQL &lt;LI&gt;Jakarta Tomcat &lt;LI&gt;NetIQ Scheduler Agent &lt;LI&gt;NetIQ LEA Service (Daemon) &lt;LI&gt;NetIQ Syslog Service (Daemon) &lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;The &lt;STRONG&gt;Apache&lt;/STRONG&gt; component is a web server used by Security Reporting Center to serve reports and to serve the application interface. Because Apache is a well-known web server, this provides for easy customization of the web hosting capabilities of Security Reporting Center. &lt;P&gt;As an example, if your installation requires a secure connection, you can simply install Apache's SSL plug-in. As the plug-in has no affect on the pages that are actually served, once it is installed and configured properly for the web server, the reports and main interface can then be accessed via this secure connection. &lt;P&gt;The Security Reporting Center Apache component appears in the Services Control Panel of Windows as 'NetIQ - Apache'. &lt;P&gt;&lt;STRONG&gt;MySQL&lt;/STRONG&gt; is used to store the report content, scheduled events and tasks, and application option settings. The Security Reporting Center MySQL component shows up in the Services Control Panel of Windows as 'NetIQ - MySQL'. &lt;P&gt;&lt;STRONG&gt;Jakarta Tomcat&lt;/STRONG&gt; is a servlet engine that allows Security Reporting Center to contain the advanced web page functionality it uses for the interface and report generation. The Jakarta Tomcat component appears in the Services Control Panel of Windows as as 'NetIQ - Tomcat'. &lt;P&gt;The NetIQ &lt;STRONG&gt;Scheduler Agent&lt;/STRONG&gt; is the process that decides when it is time to run a scheduled event, breaks the scheduled events down into tasks, and executes those tasks through the NetIQ Security Reporting agent. &lt;P&gt;The NetIQ &lt;STRONG&gt;Security Reporting agent&lt;/STRONG&gt; is the analysis engine that performs the parsing and exporting to the Content Database, among other things. This component of Security Reporting Center appears in the Services Control Panel of Windows as NetIQ Scheduler Agent. &lt;P&gt;Regardless of which components of Security Reporting Center are installed, the Scheduler Agent is also installed. &lt;P&gt;To learn more about the NetIQ &lt;STRONG&gt;LEA Service&lt;/STRONG&gt;, please refer to the following knowledge base article. &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/article.aspx?id=10550"&gt;https://support.levelblue.com/kb/article.aspx?id=10550 &lt;/A&gt;&lt;P&gt;To learn more about the NetIQ &lt;STRONG&gt;Syslog Service&lt;/STRONG&gt;, please refer to the following knowledge base article. &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/article.aspx?id=10555"&gt;https://support.levelblue.com/kb/article.aspx?id=10555 &lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB13583&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Wed, 25 Jun 2008 02:40:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>Is the Check Point Safe@Office device supported?</title><link>https://support.levelblue.com/kb/Goto10598.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Firewall Suite 4.x &lt;LI&gt;Security Reporting Center 2.x&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;Is the Check Point Safe@Office device supported? &lt;P&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;Unfortunately this device has not been quality tested so Marshal cannot support it at this time.&lt;/P&gt;&lt;P&gt;For a list of our supported devices please see the following Trustwave Knowledgebase article:&lt;/P&gt;&lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/kb/Article.aspx?id=10939" target=_blank&gt;Q10939&lt;/A&gt;: Which firewalls are supported?&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB40278&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Mon, 29 Oct 2007 20:40:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item><item><title>NGX does not work with the Lea connection and will not produce reports</title><link>https://support.levelblue.com/kb/Goto10662.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.1&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;NGX does not work with the Lea connection and will not produce reports&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Causes:&lt;/H2&gt;&lt;P&gt;Checkpoint changed the logging format of NGX. An upgrade to Checkpoint NGX can cause the lea connection to fail. &lt;/P&gt;&lt;P&gt;This failure is most likely due to a change in the CheckPoint NGX configuration file.&lt;/P&gt;&lt;P&gt;&lt;H2&gt;Reply:&lt;/H2&gt;&lt;P&gt;To correct this issue, reconfigure the &lt;CODE&gt;fwopsec.conf&lt;/CODE&gt; file according to the instructions in the Firewall Configuration guide. For the latest version of this Guide, see the &lt;A href="https://support.levelblue.com/Security-Reporting-Center/documentation.asp" target=_blank&gt;SRC Documentation&lt;/A&gt; page.&lt;/P&gt;&lt;P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB49956&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Sun, 14 Oct 2007 23:29:00 GMT</pubDate><dc:creator>Charles Creegan</dc:creator></item><item><title>How do I troubleshoot OPSEC LEA issues with Security Reporting Center?</title><link>https://support.levelblue.com/kb/Goto10496.aspx</link><description>&lt;H2&gt;This article applies to:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Security Reporting Center 2.0 &lt;LI&gt;Security Reporting Center 2.1&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Question:&lt;/H2&gt;How do I troubleshoot OPSEC LEA issues with Security Reporting Center? &lt;P&gt;&lt;H2&gt;Symptoms:&lt;/H2&gt;&lt;UL&gt;&lt;LI&gt;Unable to establish OPSEC LEA connection.&lt;/LI&gt;&lt;/UL&gt;&lt;H2&gt;Procedure:&lt;/H2&gt;&lt;FONT face=Tahoma&gt;&lt;P&gt;To determine issues with the OPSEC LEA connection, follow these steps: &lt;OL&gt;&lt;P&gt;&lt;LI&gt;Open the &lt;CODE&gt;lea_service.ini&lt;/CODE&gt; file located in the directory &lt;CODE&gt;&amp;lt;installdir&amp;gt;\modules\leaservice&lt;/CODE&gt;. &lt;LI&gt;Locate &lt;CODE&gt;DebugOutputOn=0&lt;/CODE&gt; and change the zero to a one, so that it reads &lt;CODE&gt;DebugOutputOn=1.&lt;/CODE&gt; &lt;LI&gt;Save and close the &lt;CODE&gt;lea_service.ini&lt;/CODE&gt; file. &lt;LI&gt;Click &lt;B&gt;Start&lt;/B&gt; &amp;gt; &lt;B&gt;Settings&lt;/B&gt; &amp;gt; &lt;B&gt;Control Panel&lt;/B&gt; &amp;gt; &lt;B&gt;Administrative Tools&lt;/B&gt; &amp;gt; &lt;STRONG&gt;Services&lt;/STRONG&gt; to stop the &lt;STRONG&gt;NetIQ LEA Service&lt;/STRONG&gt;. &lt;LI&gt;Download the freeware application &lt;B&gt;DebugView&lt;/B&gt; from &lt;A class=solutionlink href="http://www.sysinternals.com/ntw2k/freeware/debugview.shtml" target=_blank&gt;http://www.sysinternals.com/ntw2k/freeware/debugview.shtml&lt;/SPAN&gt;&lt;/A&gt;. &lt;FONT size=2&gt;&lt;LI&gt;Delete all profiles that are currently using the OPSEC LEA service. &lt;LI&gt;Start &lt;B&gt;DebugView&lt;/B&gt; and allow it to run in the background. &lt;LI&gt;Within &lt;B&gt;DebugView&lt;/B&gt;, select &lt;B&gt;Options&lt;/B&gt; &amp;gt; &lt;B&gt;Clock Time&lt;/B&gt;. &lt;LI&gt;Create a profile in Security Reporting Center using the OPSEC LEA service. &lt;LI&gt;Start the &lt;B&gt;NetIQ LEA Service&lt;/B&gt;. &lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;If the data does not come across the OPSEC LEA connection, view the DebugView results to determine the cause. Depending on the results shown in DebugView, you can determine which steps are needed to troubleshoot the issue.  Here is a list of the most common issues. &lt;P&gt;&lt;TABLE style="WIDTH: 550pt; BORDER-COLLAPSE: collapse" cellSpacing=0 cellPadding=0 width=879 border=1 x:str&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="20%"&gt;&lt;B&gt;&lt;FONT size=2&gt;Debug Message&lt;/FONT&gt;&lt;/B&gt;&lt;/TD&gt;&lt;TD width="20%"&gt;&lt;B&gt;&lt;FONT size=2&gt;Pause Before Result&lt;/FONT&gt;&lt;/B&gt;&lt;/TD&gt;&lt;TD width="60%"&gt;&lt;B&gt;&lt;FONT size=2&gt;Solution&lt;/FONT&gt;&lt;/B&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;COMM_IS_DEAD&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Immediate&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Configure Security Reporting Center (SRC) to point to Check Point Management Server.&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;COMM_IS_DEAD&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;10-15 seconds&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Verify IP is correct; verify CP Management Server is configured correctly&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;COMM_IS_DEAD&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Immediate&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Follow the instructions in the &lt;EM&gt;Security Reporting Center Configuration Guide&lt;/EM&gt; to configure &lt;FONT face="Courier New"&gt;fwopsec.conf&lt;/FONT&gt; &lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;COMM_IS_DEAD&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;2-3 minutes&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Add/edit ruleset to allow OPSEC LEA traffic to and from Management Server and Security Reporting Center computer&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;COMM_IS_DEAD&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Immediate&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Add/edit ruleset to allow OPSEC LEA traffic to and from Management Server and Security Reporting Center computer&lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;FONT size=2&gt;END_BY_APPLICATION&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;5 minutes&lt;/FONT&gt;&lt;/TD&gt;&lt;TD&gt;&lt;FONT size=2&gt;Varies - a connection was initiated, but timed out because there was no response from Management Server.  Usually indicates no traffic is being directed through the firewall. &lt;/FONT&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;/P&gt;&lt;/FONT&gt;&lt;/FONT&gt;&lt;P&gt;&lt;H2&gt;Notes:&lt;/H2&gt;Usually these messages are the result of firewall misconfiguration. Please ensure you follow exactly all steps in the &lt;EM&gt;Security Reporting Center Configuration Guide&lt;/EM&gt;. &lt;P&gt;&lt;A class=solutionlink href="https://support.levelblue.com/Security-Reporting-Center/documentation.asp" target=_blank&gt;https://support.levelblue.com/Security-Reporting-Center/documentation.asp&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;DL&gt;&lt;DT&gt;This article was previously published as: &lt;DD&gt;NETIQKB18254&lt;/DD&gt;&lt;/DL&gt;&lt;/I&gt;</description><pubDate>Tue, 10 Jul 2007 00:09:00 GMT</pubDate><dc:creator>Oliver Stanley</dc:creator></item></channel></rss>