Netgear FVX538v1 FVX538 Reference Manual - Page 101

Respond to Identd from SMTP Server, Send To E-mail Address

Page 101 highlights

ProSafe VPN Firewall 200 FVX538 Reference Manual 3. Enter a Schedule for sending the logs. From the Unit pull-down menu, select: Never, Hourly, Daily, or Weekly. Then fill in the Day and Time fields that correspond to your selection. 4. In the Security Logs section, check the network segments radio box for which you would like logs to be sent (for example, LAN to WAN under Dropped Packets). 5. In the System Logs section, check the radio box for the type of system events to be logged. 6. Check the Yes radio box to enable E-mail Logs. Then enter: a. E-mail Server address - Enter the outgoing E-mail SMTP mail server address of your ISP (for example, 172.16.1.10). If you leave this box blank, no logs will be sent to you. b. Return E-mail Address - Enter the e-mail address of the user. c. Send To E-mail Address - Enter the e-mail address where the logs and alerts should be sent. You must use the full e-mail address (for example, [email protected]). 7. The No Authentication radio box is checked by default. If your SMTP server authenticates users, uncheck the radio box by selecting the authentication type-either Login Plain or CRAM-MD5-based on your SMTP server requirements. Then enter the user name and password to be used for authentication. 8. If you want to respond to IDENT protocol, check the Respond to Identd from SMTP Server radio box. The Ident Protocol is an Internet protocol that helps identify the user of a particular TCP connection (a common daemon program for providing the ident service is identd). 9. You can configure the firewall to send system logs to an external PC that is running a syslog logging program. Click the Yes radio box to enable SysLogs and send messages to the Syslog Server, then: a. Enter your SysLog Server IP address b. Select the appropriate syslog severity from the SysLog Severity pull-down menu. The SysLog levels of severity are as follows: • LOG_EMERG (System is unusable) • LOG_ALERT (Action must be taken immediately) • LOG_CRITICAL (Critical conditions) • LOG_ERROR (Error conditions) • LOG_WARNING (Warning conditions) • LOG_NOTICE (Normal but significant conditions) • LOG_INFO (Informational messages) • LOG_DEBUG (Debug level messages) 10. Click Reset to cancel your changes and return to the previous settings. Firewall Protection and Content Filtering v1.0, March 2009 4-41

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240

ProSafe VPN Firewall 200 FVX538 Reference Manual
Firewall Protection and Content Filtering
4-41
v1.0, March 2009
3.
Enter a
Schedule
for sending the logs. From the
Unit
pull-down menu, select: Never, Hourly,
Daily, or Weekly. Then fill in the Day and Time fields that correspond to your selection.
4.
In the
Security Logs
section, check the network segments radio box for which you would like
logs to be sent (for example, LAN to WAN under Dropped Packets).
5.
In the
System Logs
section, check the radio box for the type of system events to be logged.
6.
Check the
Yes
radio box to enable E-mail Logs. Then enter:
a.
E-mail Server address
– Enter the outgoing E-mail SMTP mail server address of your
ISP (for example, 172.16.1.10). If you leave this box blank, no logs will be sent to you.
b.
Return E-mail Address
– Enter the e-mail address of the user.
c.
Send To E-mail Address
– Enter the e-mail address where the logs and alerts should be
sent. You must use the full e-mail address (for example, [email protected]).
7.
The
No Authentication
radio box is checked by default. If your SMTP server authenticates
users, uncheck the radio box by selecting the authentication type—either
Login Plain
or
CRAM-MD5
—based on your SMTP server requirements. Then enter the user name and
password to be used for authentication.
8.
If you want to respond to IDENT protocol, check the
Respond to Identd from SMTP Server
radio box. The Ident Protocol is an Internet protocol that helps identify the user of a particular
TCP connection (a common daemon program for providing the ident service is identd).
9.
You can configure the firewall to send system logs to an external PC that is running a syslog
logging program. Click the
Yes
radio box to enable SysLogs and send messages to the Syslog
Server, then:
a.
Enter your
SysLog Server
IP address
b.
Select the appropriate syslog severity from the
SysLog Severity
pull-down menu. The
SysLog levels of severity are as follows:
LOG_EMERG (System is unusable)
LOG_ALERT (Action must be taken immediately)
LOG_CRITICAL (Critical conditions)
LOG_ERROR (Error conditions)
LOG_WARNING (Warning conditions)
LOG_NOTICE (Normal but significant conditions)
LOG_INFO (Informational messages)
LOG_DEBUG (Debug level messages)
10.
Click
Reset
to cancel your changes and return to the previous settings.