O'Reilly logo

Configuring IPCop Firewalls by James Eaton-Lee, Barrie Dempster

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Logfiles and Monitoring Usage

As part of good security management, it is important to retain the capacity to notice trends in behavior and usage of information systems, which allow us to notice changes proactively. A change in usage of a proxy server, memory usage, or CPU load may indicate something innocuous, such as a rise in user activity or a need for upgraded hardware, a hardware fault, or even malicious activity.

Establishing a Baseline with Graphs

It is important, therefore, to establish a baseline for how our server behaves in order to be able to identify when a particular piece of behavior is out of the ordinary. IPCop aids us greatly here by providing us with graphical tools to monitor (and graph) statistics such as proxy connections ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required