Netgear FVL328 FVL328 Reference Manual - Page 119

Enabling the Syslog Feature, Enabling Security Event E-mail Notification

Page 119 highlights

Model FVL328 ProSafe High-Speed VPN Firewall Reference Manual Revision 2 • All Outgoing TCP/UDP/ICMP traffic • Other IP traffic - if selected, all other traffic (IP packets which are not TCP, UDP, or ICMP) is logged • Router operation (start up, get time, etc.) - if selected, Router operations, such as starting up and getting the time from the Internet Time Server, are logged. • Connection to the Web-based interface of this Router • Other connections and traffic to this Router - if selected, this will log traffic sent to this Router (rather than through this Router to the Internet). • Allow duplicate log entries - if selected, events or packets that fall within more than one (1) category above will have a log entry for each category in which they belong. This will generate a large number of log entries. If not selected, then events or packets will only be logged once. Usually, you should not allow duplicate log entries. Enabling the Syslog Feature You can choose to write the logs to a computer running a SYSLOG program. To use this feature, check the box under Syslog and enter the IP address of the server where the log file will be written. Then click Apply to activate the Syslog feature. For a detailed description of the log files, see Appendix D, "Firewall Log Formats". Enabling Security Event E-mail Notification In order to receive logs and alerts by e-mail, you must provide your e-mail information in the E-mail menu: Managing Your Network May 2004, 202-10030-02 7-15

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234

Model FVL328 ProSafe High-Speed VPN Firewall Reference Manual Revision 2
Managing Your Network
7-15
May 2004, 202-10030-02
All Outgoing TCP/UDP/ICMP traffic
Other IP traffic — if selected, all other traffic (IP packets which are not TCP, UDP, or ICMP)
is logged
Router operation (start up, get time, etc.) — if selected, Router operations, such as starting up
and getting the time from the Internet Time Server, are logged.
Connection to the Web-based interface of this Router
Other connections and traffic to this Router — if selected, this will log traffic sent to this
Router (rather than through this Router to the Internet).
Allow duplicate log entries — if selected, events or packets that fall within more than one (1)
category above will have a log entry for each category in which they belong. This will
generate a large number of log entries.
If not selected, then events or packets will only be logged once. Usually, you should not allow
duplicate log entries.
Enabling the Syslog Feature
You can choose to write the logs to a computer running a SYSLOG program. To use this feature,
check the box under Syslog and enter the IP address of the server where the log file will be written.
Then click Apply to activate the Syslog feature.
For a detailed description of the log files, see
Appendix D, “Firewall Log Formats”
.
Enabling Security Event E-mail Notification
In order to receive logs and alerts by e-mail, you must provide your e-mail information in the
E-mail menu: