Using the Debug log
Debug log overview
Logs keep information records of selected events occurred in or detected by Kerio Control. For more information about configuring and using logs, see article Configuring and using logs in Kerio Control.
Debug (debug information) is a special log which can be used to monitor certain kinds of information, especially for problem-solving. Too much information could be confusing and impractical if displayed all at the same time. Usually, you only need to display information relating to a particular service or function. In addition, displaying too much information slows Kerio Control's performance. Therefore, it is strongly recommended to monitor an essential part of information and during the shortest possible period only.
Using the Debug log
Selection of information monitored by the Debug log
The window's context menu for the Debug log includes further options for advanced settings of the log and for an on-click one-time view of status information.
These options are available only to users with full administration rights for Kerio Control.
Format of Logged Packets
For logging network traffic a template is used which defines which information will be recorded and what format will be used for the log. This helps make the log more transparent and reduce demands on disk space.
For more information refer to Log packet formatting.
>Packet Logging
This function enables monitoring of IPv4Version 4 of the Internet Protocol. or IPv6Version 6 of the Internet Protocol. packets according to the user defined log expression.
Logging of IP traffic can be cancelled by leaving or setting the Expression entry blank.
For more information refer to Logging packets.
Show Status
A single overview of status information regarding certain Kerio Control components. This information can be helpful especially when solving problems with Kerio Technologies technical support.
Packet Dump To File
This function enables monitoring of IPv4 or IPv6 packets according to the user defined log expression and saving the Debug log to the special file. The packet dump can be downloaded and saved in your computer and opened by Wireshark.
For more information refer to Logging packets.
WARNING
If the expression is too general, the packet dump file gets large and exhausts free disk space. The network traffic is continuously dumped, even after the administrator logs out of the administration. For those reasons, some time after the recording starts a warning notification appears in the administration interface.
Messages
This feature allows advanced monitoring of functioning of individual Kerio Control modules. This information may be helpful when solving issues regarding Kerio Control components and/or certain network services.
- WANWide area network - A network that connects computers and other devices in a large area./Dial-Up messages — information about dialed lines (request dialing, auto disconnection down-counter),
- Kerio Control services — protocols processed by Kerio Control services (DHCPDynamic Host Configuration Protocol - A protocol that automatically gives IP addresses and additional configuration to hosts in a network. server, the DNSDomain Name System - A database enables the translation of hostnames to IP addresses and provides other domain related information. module, web interface, and UPnP support, IPv6 router advertisement),
- Decoded protocols — logs of specific protocols (HTTPHypertext Transfer Protocol - protocol for exchange of hypertext documents in HTML. and DNS),
- Filtering — logs proving information on filtering of traffic passing through Kerio Control (antivirus control, website classification, detection and elimination of P2PPeer-to-Peer networks are worldwide distributed systems where each node can be used both as a client and a server. networks, intrusion detection and prevention, dropped packets, etc.),
- Accounting — user authentication and monitoring of their activities (protocol recognition, statistics and reporting, etc.),
- Miscellaneous — additional data (e.g. packet processing Bandwidth Limiter, switching between primary and secondary Internet connection, HTTP cache, license use, update checker, dynamic DNS, system configuration in Appliance and Box, etc.),
- Protocol Inspection — reports from individual Kerio Control's protocol inspectors (sorted by protocol),
- Kerio VPNVirtual private network - A network that enables users connect securely to a private network over the Internet. — detailed information on traffic within Kerio VPN — VPN tunnels, VPN clients, encryptions, exchange of routing information, etc.
- IPsecInternet Protocol security - A network protocol used to encrypt and secure data sent over a network. — detailed information about IPsec traffic:
- Select General for general information about IPsec tunnel.
- Select Charon output for solving problems with ciphers (the same cipher must be used on both endpoints).
- Select L2TPD output/PPPD output for solving problems with L2TPLayer 2 Tunneling Protocol - A tunneling protocol used with IPsec./PPP tunnels.