web proxy log analysis

Most Relevant Content

  • MikroTik WebProxy Log Analyzer Configuration

    MikroTik RouterOS generally logs various system events and status information. Logs are mainly saved in router’s memory (RAM) or disk. MikroTik logs can also be sent by email or even can be sent to a remote syslog server. All logs those are saved in router’s local memory can be viewed from Log menu. Any log entry that is saved in local memory contains time and date when event occurred, topics that this message belongs to and message itself. But local log information is not enough for analyzing user’s activity completely. So, if you wish to view user activity elaborately, you must use any remote syslog server. In this article, I will configure a remote syslog server named WebProxy Log Analyzer which will help to get user activity more elaborately. WebProxy Log Analyzer Configuration WebProxy Log Analyzer is a windows based syslog server. So, installation and configuration are hassle free and so easy. There are two end configuration for configuring a WebProxy Log Analyzer server. MikroTik End Configuration for sending log information to WebProxy Syslog Server. Webproxy Log Analyzer configuration in windows operating system. MikroTik Configuration for Sending Log Information MikroTik Router basic configuration and transparent web proxy configuration are prerequisites [...]

    READ MORE »

  • You May Also Like

  • »

    Computer Network Topology Outline |   September 12, 2017

    The first thing that has to study about a network is its physical shape or design layout. It will be extremely important when a wiring scheme and design are selected for a new network installation. Actually Network Topology refers to physical shape or design layout of a network. Network topology determines how different nodes in a network are connected and how these nodes communicate to each other. Types of Computer Network Topology Network really has two shapes or two types [...]

    READ MORE »

  • »

    How to Create Free SSL/TLS Certificate with OpenSSL |   July 23, 2021

    SSL/TLS certificate is required to encrypt data sent over internet communication. Without encryption, the sent data can be hacked by the middle man attack. SSL/TLS certificate is usually a pair key, public key and private key, solution where data is encrypted with public key and decrypted with private key. In public communication, public key is required to be signed by a CA (certificate authority) but in private communication, there is no need to be signed by any CA. If we [...]

    READ MORE »

  • »

    MikroTik Site to Site VPN with L2TP/IPsec |   March 3, 2018

    VPN (Virtual Private Network) is a technology that provides a secure and encrypted tunnel across a public network. A private network user can send and receive data to any remote private network using this VPN Tunnel as if his/her network device was directly connected to that private network. MikroTik L2TP server is one of the most popular VPN services. It provides a secure and encrypted tunnel across public network for transporting IP traffic using PPP. L2TP/IPsec is more secure than [...]

    READ MORE »

  • »

    Ubuntu RADIUS Server Configuration with freeRADIUS |   September 3, 2022

    Ubuntu Server is one of most popular open-source Linux Server distribution. It is stable and reliable than other Linux distributions. So, enterprise level application can be hosted on Ubuntu Server. Ubuntu RADIUS Server is popularly used for remote authentication and mostly used with the freeRADIUS open source RAIDUS application. freeRADIUS is one of the most popular and powerful AAA (Authorization, Authentication and Accounting) application. Any enterprise (specially ISP company) can use freeRADIUS for AAA solution and can develop billing system. [...]

    READ MORE »

  • »

    HTTP vs. HTTPS: The Impact Of Using SSL Certificates |   November 29, 2021

    Google and cybersecurity experts continue to make clarion calls to web admins and website owners to switch from HTTP to HTTPS. But is there any difference between the two other than the extra “S” at the end of HTTPS? Not everyone understands the differences between HTTP and HTTPS and why the difference is so significant. In this post, we will discuss the differences between HTTP and HTTPS, the reasons why you need to switch from HTTP to HTTPS, and the [...]

    READ MORE »

  • »

    GNS3 Installation and Configuration Step by Step in Windows |   September 14, 2018

    GNS3 (Graphical Network Simulator) is one of the most popular network simulator software used by hundreds of thousands of network engineers worldwide to emulate, configure, test and troubleshoot virtual and real networks. GNS3 supports a large number of vendors such as MikroTik, Cisco, Juniper, Windows, Linux and many other vendors. GNS3 can be installed on Windows, Linux and MAC Operating System. In this article, I will show how to download and install GNS3 application in Windows Operating System. I will [...]

    READ MORE »

  • »

    MikroTik Load Balancing and Link Redundancy with ECMP |   October 28, 2016

    Load balancing and link redundancy is the main concern to any network administrator. Because, they always want to keep live their network 24/7. If you have multiple WAN connections, you can easily make a load balancing as well as link redundancy network with MikroTik Router. Different types of load balancing and link redundancy are present in MikroTik Router. ECMP Load Balancing is one of them. ECMP is so easy to implement and it provides an perfect load balancing solution. In this [...]

    READ MORE »

  • »

    How to Create Gmail Account Successfully |   August 17, 2015

    Email is the heart of any business communication today. Not only enterprise companies but also our personal life’s activities are mostly depended on email. So, every person should have an email account today. There are many online companies (such as Gmail, Yahoo and Hotmail) who are providing free email services for any online users. Among these online companies, Gmail is the most popular free email service by Google with 15 GB free storage facility. Gmail has huge features to maintain [...]

    READ MORE »

  • »

    Firewalld Installation and Configuration in Ubuntu Server |   May 5, 2022

    Firewalld is an awesome host based firewall management tool for Linux Operating System. Firewalld has developed on Fedora but it is now available for almost all Linux distributions. So, Firewalld can be installed in Ubuntu Server although Ubuntu Server has UFW as the default firewall system. Firewalld is more robust and easy to maintain than UFW, I think. So, I am going to discuss how to install and configure Firewalld in Ubuntu Server.  Installing Firewalld in Ubuntu Server By default [...]

    READ MORE »