Netgear FVG318v1 FVG318 Reference Manual - Page 77

Respond to Identd from SMTP Server

Page 77 highlights

ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual • Enter the Return E-Mail Address to which logs and alerts are sent. This e-mail address will also be used as the Send To E-mail address. If you leave this box blank, log and alert messages will not be sent via e-mail. 7. If the SMTP server requires authentication before accepting connections, select either Login Plain or CRAM-MD5 and enter the User Name and Password to be used for authentication. To disable authentication, select the No Authentication radio box (default). 8. Check the Respond to Identd from SMTP Server radio box to configure the router to respond to an IDENT request from the SMTP server. 9. In the Send logs according to this schedule section, you can specify that logs are sent to you according to a schedule. From the Unit pull-down menu, select to receive logs Never, Hourly, Daily, or Weekly. Depending on your selection, specify: • Day for sending log Relevant when the log is sent weekly or daily. • Time for sending log Relevant when the log is sent daily or weekly. 10. If you want the router to send logs to a SysLog server, select the Yes radio box in the Enable SysLogs section and input the following fields: a. SysLog Server. Enter the IP address or Internet Name of the SysLog server. b. SysLog Facility. Select the appropriate syslog facility (Local0 to Local7). 11. Click Apply to save your settings. Note: You can configure the firewall to send system logs to an external PC that is running a syslog logging program. Logging programs are available for Windows, Macintosh, and Linux computers. The firewall logs security-related events such as denied incoming and outgoing service requests, hacker probes, and administrator logins. If you enable content filtering in the Block Sites menu, the Log page will also show you when someone on your network tried to access a blocked site. If you enabled e-mail notification, you will receive these logs in an e-mail message. If you don't have e-mail notification enabled, you can view the logs, as well as e-mail the logs by clicking the View Log link on the Firewall Logs & E-mail screen. Firewall Protection and Content Filtering v1.0, September 2007 4-17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
Firewall Protection and Content Filtering
4-17
v1.0, September 2007
Enter the
Return E-Mail Address
to which logs and alerts are sent. This e-mail address
will also be used as the Send To E-mail address. If you leave this box blank, log and alert
messages will not be sent via e-mail.
7.
If the SMTP server requires authentication before accepting connections, select either
Login
Plain
or
CRAM-MD5
and enter the
User Name
and
Password
to be used for authentication.
To disable authentication, select the
No Authentication
radio box (default).
8.
Check the
Respond to Identd from SMTP Server
radio box to configure the router to
respond to an IDENT request from the SMTP server.
9.
In the
Send logs according to this schedule
section, you can specify that logs are sent to you
according to a schedule. From the
Unit
pull-down menu, select to receive logs
Never
,
Hourly
,
Daily
, or
Weekly.
Depending on your selection, specify:
Day
for sending log
Relevant when the log is sent weekly or daily.
Time
for sending log
Relevant when the log is sent daily or weekly.
10.
If you want the router to send logs to a SysLog server, select the
Yes
radio box in the
Enable
SysLogs
section and input the following fields:
a.
SysLog Server. Enter the IP address or Internet Name of the SysLog server.
b.
SysLog Facility. Select the appropriate syslog facility (Local0 to Local7).
11.
Click
Apply
to save your settings.
The firewall logs security-related events such as denied incoming and outgoing service requests,
hacker probes, and administrator logins. If you enable content filtering in the Block Sites menu,
the Log page will also show you when someone on your network tried to access a blocked site. If
you enabled e-mail notification, you will receive these logs in an e-mail message. If you don't have
e-mail notification enabled, you can view the logs, as well as e-mail the logs by clicking the
View
Log
link on the Firewall Logs & E-mail screen.
Note:
You can configure the firewall to send system logs to an external PC that is
running a syslog logging program. Logging programs are available for
Windows, Macintosh, and Linux computers.