08-04-2004
You need to give us more information. By "an HP", I take it you mean the machine in question is running some variant of HP-UX?
What Proxy server are you running? (Version, name, etc)
Log files for most things are generally stored under /var and it's subdirectories.
You probably should read
this before posting again.
Cheers
ZB
8 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Are there any decent proxy programs out there that will filter domains and forward them to specific ip addresses and ports? I'm looking for a proxy that can be configured to take a request, examine the domain it is going to and then forward it to be proxied through other machines on the network... (6 Replies)
Discussion started by: rado
6 Replies
2. BSD
how do i configure proxy in freeBSD or NAT so that when i set it up as a server can connect other to my new gateway (0 Replies)
Discussion started by: AkinOkin
0 Replies
3. Shell Programming and Scripting
Hi,
I am trying to write a script which would go search and get the info from the logs based on yesterday timestamp and write yesterday logs in new file. The log file format is as follows:
""""""""""""""""""""""""""... (3 Replies)
Discussion started by: harish.parker
3 Replies
4. IP Networking
Hi,
I am involved in a project on Debian. One of my requirement is to route an IP packet in my application to a proxy server and receive the reply from the proxy server as an IP packet. My application handles data at the IP frame level. My application creates an IP packet(with all the necessary... (0 Replies)
Discussion started by: Rajesh_BK
0 Replies
5. Linux
ok, in my company i have a proxy that filter some url (yea, i know ;))
It was more then 7 year that i made a ssh tunnel with my linux machine, at work i used putty and redirect the internal squid proxy... it work very well!
Yesterday the sysadmin has made a "content port filtering" and block... (0 Replies)
Discussion started by: zanac
0 Replies
6. IP Networking
I need to configure a proxy on my local machine to use an upstream proxy (installed on another machine). The upstream proxy requires Digest/NTLM authorization. I want the local proxy to deal with the upstream proxy's authorization details and provides authorization free access to users that connect... (0 Replies)
Discussion started by: Russel
0 Replies
7. Cybersecurity
Hi all,
I'm trying to identify what this is in my proxy access logs:
POST http://123.123.123.123/open/1
Followed by thousands of:
POST http://123.123.123.123/IVmYwvJKhJFesFjK/1001
POST http://123.123.123.123/IVmYwvJKhJFesFjK/1002
POST http://123.123.123.123/IVmYwvJKhJFesFjK/1003
... (2 Replies)
Discussion started by: STOIE
2 Replies
8. Shell Programming and Scripting
Appreciate help for the below issue.
Im using below code.....I dont want to attach the logs when I ran the perl twice...I just want to take backup with today date and generate new logs...What I need to do for the below scirpt..............
1)if logs exist it should move the logs with extention... (1 Reply)
Discussion started by: Sanjeev G
1 Replies
LEARN ABOUT DEBIAN
welf_proxy2dlf
WELF_PROXY2DLF.IN(1) LogReport's Lire Documentation WELF_PROXY2DLF.IN(1)
NAME
welf_proxy2dlf - convert logs in WebTrends Enhanced Log Format to proxy DLF
SYNOPSIS
welf_proxy2dlf file
DESCRIPTION
welf_proxy2dlf converts firewall logs in the WebTrends Enhanced Log Format into the proxy DLF.
That format is defined at the following URL: http://www.netiq.com/partners/technology/welf.asp
This converter also supports the SonicWall extensions.
A list of firewall products that supports that format can be found at the following URL: http://www.netiq.com/products/fwr/compatible.asp
EXAMPLES
To process a log as produced by a WebTrends proxy:
$ welf_proxy2dlf < welf-proxy.log
welf_proxy2dlf will be rarely used on its own, but is more likely called by lr_log2report:
$ lr_log2report welf_proxy < /var/log/welf-proxy.log
IMPLEMENTATION NOTES
Welf log files contains information about many applications: proxies, packet filters, IDS. IDS and packet filters information is handled by
the firewall superservice, whereas the proxy information is handled by the proxy supersevice.
This converter will only convert records with a proto, src and dst field. All other records are ignored (they won't be ignored by the
firewall superservice).
SEE ALSO
Lire::WELF(3) welf2dlf(1)
AUTHORS
Francis J. Lacoste <flacoste@logreport.org>
VERSION
$Id: welf_proxy2dlf.in,v 1.8 2006/07/23 13:16:36 vanbaal Exp $
COPYRIGHT
Copyright (C) 2001 Stichting LogReport Foundation LogReport@LogReport.org
This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by
the Free Software Foundation; either version 2 of the License, or (at your option) any later version.
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details.
You should have received a copy of the GNU General Public License along with this program (see COPYING); if not, check with
http://www.gnu.org/copyleft/gpl.html.
Lire 2.1.1 2006-07-23 WELF_PROXY2DLF.IN(1)