After Secure Web Gateway (SWG) starts proxying web access, it provides information that you can use to monitor threats and to fine-tune URL filters and schemes. SWG provides reports, statistics, and logs. If you configure high-speed remote event logging, you have data on a remote system from which you can create your own reports.
Secure Web Gateway (SWG) supports high-speed logging and can store event logs in a local database or on a pool of remote servers (recommended). SWG event logging occurs separately from Access Policy Manager® (APM®) logging and from BIG-IP® system logging as well.
Logs for the access policies that are part of an SWG configuration depend on APM report preference settings. Access policy logs might be in the /var/log/apm file or in a local database that APM reports uses.
You can log Secure Web Gateway (SWG) events either locally on the BIG-IP® system or remotely, using the BIG-IP system's high-speed logging mechanism. For remote logging, the high-speed logging mechanism sends log messages to a pool of logging servers that you define. Remote logging is the recommended configuration.
For local logging, the high-speed logging mechanism stores the logs in either the Syslog or the MySQL database on the BIG-IP system, depending on a destination that you specify. The available local destinations are:
Although local logging is not recommended, you can store log messages locally on the BIG-IP system instead of or in addition to storing logs remotely.
F5® recommends remote high-speed logging. However, you can configure local logging instead of or in addition to remote logging if you want to do so.
You can view Secure Web Gateway (SWG) statistics on the BIG-IP® system and adjust SWG based on the information that you gather from reports. Charts display statistical information about web traffic on your system, including the following details:
The system updates the statistics every five minutes; you can refresh the charts periodically to see the updates. SWG provides overview charts and report charts.
From the overview or reports, you can export data to a PDF or CSV file, or send the reports to one or more email addresses.
The system updates the statistics for charts and reports at five minute intervals: at five minutes after the hour, ten minutes after the hour, and so on.
Charts and data that you export from charts reflect the publishing interval of five minutes. For example, if you request data for the time period 12:40-13:40, the data in the chart or in the file that you export is for the time period 12:35-13:35. By default, the BIG-IP® system displays one hour of data.
|Export the data in option format||Specify the export format:
|Save the report file on your computer||Select this option to save or open the file containing the report.|
|Send the report file as an attachment to the following E-mail address(es)||Type one or more email addresses (separated by comma or semicolon) to which to send the report.|
You can configure the BIG-IP® system to log information about Secure Web Gateway (SWG) events and send the log messages to remote high-speed log servers.
When configuring remote high-speed logging of SWG events, it is helpful to understand the objects you need to create and why, as described here:
|Object to create in implementation||Reason|
|Pool of remote log servers||Create a pool of remote log servers to which the BIG-IP system can send log messages.|
|Destination (unformatted)||Create a log destination of Remote High-Speed Log type that specifies a pool of remote log servers.|
|Destination (formatted)||If your remote log servers are the ArcSight, Splunk, or Remote Syslog type, create an additional log destination to format the logs in the required format and forward the logs to a remote high-speed log destination.|
|Publisher||Create a log publisher to send logs to a set of specified log destinations.|
|Log Setting||Create event log settings to enable logging of user-specified data, and associate a log publisher with the log settings.|
|SWG configuration||Create a configuration for SWG explicit forward proxy or transparent forward proxy.|
|Access profile||Add log settings to the access profile in the explicit forward proxy or transparent forward configuration.|
|Virtual server||In a SWG configuration, an access profile is associated with the virtual server that handles the forward proxy traffic.|
Create a log destination of the Remote High-Speed Log type to specify that log messages are sent to a pool of remote log servers.
Create a formatted logging destination to specify that log messages are sent to a pool of remote log servers, such as Remote Syslog, Splunk, or ArcSight servers.
Log Allowed Events: When selected, user requests for allowed URLs are logged.