How to Enable the NetScaler to Log Traffic that is Denied Because of Access Control List Policies
book
Article ID: CTX121593
calendar_today
Updated On:
Description
This article contains information about enabling the NetScaler appliance to log the traffic that is denied due to the NetScaler Access Control List (ACL) policies. ACLs are used to filter the IP traffic and secure the network from an unauthorized access. An ACL consists of a set of conditions or criteria that the NetScaler appliance uses to allow or deny access to the network.
Instructions
To configure ACL logging by using the configuration utility
You can configure logging for an ACL and specify the number of log messages that the rule can generate.
- In the configuration utility, in the navigation pane, expand System > Network and then click ACLs.
- In the details pane, click the Extended ACLs tab and then click Add.
- In the Create Extended ACL dialog box, in Name, type a name for the policy.
- Select the Log State check box.
- In the Log Rate Limit text box, type the rate limit that you want to specify for the rule and then click Create.
After you configure ACL logging, you can enable it on NetScaler Gateway. Create an auditing policy and then bind it to a user, group, virtual server, or globally.
To enable ACL or TCP logging on NetScaler Gateway
- In the configuration utility, in the navigation pane, expand NetScaler Gateway > Policies > Auditing, .
- Select either syslog or nslog.
- On the Servers tab, click Add.
- In the Create Auditing Server dialog box, in Name, type a name for the server and then configure the server settings
- Click ACL Logging or TCP Logging and then click Create.
Issue/Introduction
This article provides information on how to enable the NetScaler to log the traffic that is denied because of the Access Control list policies.
Was this article helpful?
thumb_up
Yes
thumb_down
No