SONICWALL TZ 170 FIREWALL
Sawmill is a SonicWall TZ 170 Firewall log analyzer (it also supports the 1021 other log formats listed to the left).
It can process log files
in SonicWall TZ 170 Firewall format, and generate dynamic statistics from them,
analyzing and reporting events.
Sawmill can parse SonicWall TZ 170 Firewall logs, import them into a MySQL, Microsoft SQL Server, or Oracle database (or its own built-in database),
aggregate them, and generate dynamically filtered reports, all through a web interface.
Sawmill can perform SonicWall TZ 170 Firewall log analysis on any platform, including Windows, Linux, FreeBSD, OpenBSD, Mac OS, Solaris, other UNIX, and others.
Sawmill stores the following non-numerical fields in its database for SonicWall TZ 170 Firewall, generates reports for each field, and allows dynamic filtering on any combination of these fields:
|Field|| ||Internal Name|
| ||date/time|| ||date_time|
| ||day of week|| ||day_of_week|
| ||hour of day|| ||hour_of_day|
| ||message type|| ||message_type|
| ||action|| ||action|
| ||source IP|| ||source_ip|
| ||location|| ||location|
| ||source port|| ||source_port|
| ||source network|| ||source_network|
| ||destination IP|| ||destination_ip|
| ||destination port|| ||destination_port|
| ||destination network|| ||destination_network|
| ||destination description|| ||destination_description|
| ||scanned port list|| ||scanned_port_list|
Sawmill stores the following numerical fields in its database for SonicWall TZ 170 Firewall, aggregating them and including them as columns in most reports:
|Numerical Field|| ||Internal Name|
| ||events|| ||events|
| ||unique source IPs|| ||unique_source_ips|
See Sawmill Features to learn more about Sawmill's options for viewing, customizing, filtering, exporting and scheduling SonicWall TZ 170 Firewall reports.
Sawmill also supports 1021 other log formats.