Jump to content
Welcome to our new Citrix community!

Log's IP Reputation


Rodrigo Melo

Recommended Posts

Hello

 

I configured the ip reputation in netscaler, I created a responder rule for blocked malicios ip and bind in virtual server. In statistics, I see several hits in the rule, but I can not find the ip's blocked in the log

How I visualize th ip's blocked?

 

 

Tag "Log in newsnslog" is able

Link to comment
Share on other sites

First of all, enabling the "Log in Newnslog" probably doesn't add anything for you, as you are probably only wanting to look in the syslog (newnslog is the binary format log file).

 

What expression did you use in the log action? (That's what defines the detail of what gets written to the syslog file)

Link to comment
Share on other sites

1) Like Paul said, I would keep logging in newnslog off and rely on logging to syslog (default) instead. If the value is off, you will log to syslog (/var/log/ns.log) and if enabled, you are reporting to nslog instead (/var/nslog/newnslog)

 

2) In your syslog parameters (global setting) or individual syslog policies (if logging to external log location), you need to ENABLE "user configurable log messages".  This will allow any policies with audit actions (custom logging) to report in whichever log you expect. If this setting is not enabled, you still won't see the audit logs.

 

3) Finally, in your responder policy performing the IP_Reputation filtering, configure the appropriate audit log actions.  When the policies are hit, your audit actions will now be reported to syslog (or nslog depending on above settings).

Link to comment
Share on other sites

1) Like Paul said, I would keep logging in newnslog off and rely on logging to syslog (default) instead. If the value is off, you will log to syslog (/var/log/ns.log) and if enabled, you are reporting to nslog instead (/var/nslog/newnslog)

 

2) In your syslog parameters (global setting) or individual syslog policies (if logging to external log location), you need to ENABLE "user configurable log messages".  This will allow any policies with audit actions (custom logging) to report in whichever log you expect. If this setting is not enabled, you still won't see the audit logs.

 

3) Finally, in your responder policy performing the IP_Reputation filtering, configure the appropriate audit log actions.  When the policies are hit, your audit actions will now be reported to syslog (or nslog depending on above settings).

I will test this in the next week and post the result 

 

Thanks everyone for all help

Link to comment
Share on other sites

  • 3 years later...

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...