Netgear WNR2200 N300 Wireless Router with USB WNR2200 User Manual - Page 53

Viewing Logs of Web Access or Attempted Web Access, Send Logs According to this Schedule

Page 53 highlights

N300 Wireless Router with USB WNR2200 User Manual a. Enter the name of your ISP's outgoing (SMTP) mail server (such as mail.myISP.com) in the Your Outgoing Mail Server field. You might be able to find this information in the configuration screen of your e-mail program. If you leave this field blank, log and alert messages will not be sent by e-mail. b. Enter the e-mail address to which logs and alerts are sent in the Send To This E-mail Address field. This e-mail address will also be used as the From address. If you leave this field blank, log and alert messages will not be sent by e-mail. 3. If your outgoing e-mail server requires authentication, select the My Mail Server requires authentication check box. a. Enter your user name for the outgoing e-mail server in the User Name field. b. Enter your password for the outgoing e-mail server in the Password field. 4. You can specify that logs are automatically sent by e-mail with these options: • Send alert immediately. Select this check box for immediate notification of attempted access to a blocked site or service. • Send Logs According to this Schedule. Specifies how often to send the logs: Hourly, Daily, Weekly, or When Full. - Day. Specifies which day of the week to send the log. Relevant when the log is sent weekly or daily. - Time. Specifies the time of day to send the log. Relevant when the log is sent daily or weekly. If you select the Weekly, Daily, or Hourly option and the log fills up before the specified period, the log is automatically e-mailed to the specified e-mail address. After the log is sent, the log is cleared from the router's memory. If the router cannot e-mail the log file, the log buffer might fill up. In this case, the router overwrites the log and discards its contents. 5. Click Apply to save your settings. So that the log entries are correctly time-stamped and sent at the correct time, be sure to set the time as described in the next section. Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of the websites you have accessed or attempted to access. Up to 256 entries are stored in the log. Log entries appear only when keyword blocking is enabled and no log entries are made for the trusted user. Protecting Your Network v1.0, September 2010 3-10

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145

N300 Wireless Router with USB WNR2200 User Manual
Protecting Your Network
3-10
v1.0, September 2010
a.
Enter the name of your ISP’s outgoing (SMTP) mail server (such as
mail.myISP.com
) in
the
Your Outgoing Mail Server
field. You might be able to find this information in the
configuration screen of your e-mail program. If you leave this field blank, log and alert
messages will not be sent by e-mail.
b.
Enter the e-mail address to which logs and alerts are sent in the
Send To This E-mail
Address
field. This e-mail address will also be used as the From address. If you leave this
field blank, log and alert messages will not be sent by e-mail.
3.
If your outgoing e-mail server requires authentication, select the
My Mail Server requires
authentication
check box.
a.
Enter your user name for the outgoing e-mail server in the
User Name
field.
b.
Enter your password for the outgoing e-mail server in the
Password
field.
4.
You can specify that logs are automatically sent by e-mail with these options:
Send alert immediately
. Select this check box for immediate notification of attempted
access to a blocked site or service.
Send Logs According to this Schedule
. Specifies how often to send the logs: Hourly,
Daily, Weekly, or When Full.
Day
. Specifies which day of the week to send the log. Relevant when the log is sent
weekly or daily.
Time
. Specifies the time of day to send the log. Relevant when the log is sent daily or
weekly.
If you select the Weekly, Daily, or Hourly option and the log fills up before the specified
period, the log is automatically e-mailed to the specified e-mail address. After the log is sent,
the log is cleared from the router’s memory. If the router cannot e-mail the log file, the log
buffer might fill up. In this case, the router overwrites the log and discards its contents.
5.
Click
Apply
to save your settings.
So that the log entries are correctly time-stamped and sent at the correct time, be sure to set the
time as described in the next section.
Viewing Logs of Web Access or Attempted Web Access
The log is a detailed record of the websites you have accessed or attempted to access. Up to
256 entries are stored in the log. Log entries appear only when keyword blocking is enabled and no
log entries are made for the trusted user.