Netgear DG834G DG834Gv4 Reference Manual - Page 62

Selecting Which Information to Log, Saving Log Files on a Server, Broadcast on LAN

Page 62 highlights

ADSL2+ Modem Wireless Router DG834G Reference Manual Table 4-4. Security Log Entry Descriptions Field Description Source IP The IP address of the initiating device for this log entry. Source port and interface The service port number of the initiating device, and whether it originated from the LAN or WAN. Destination The name or IP address of the destination device or website. Destination port and The service port number of the destination device, and whether it is on interface the LAN or WAN. Log action buttons are described in the following table. Table 4-5. Log Action Buttons Field Refresh Clear Log Send Log Apply Cancel Description Refresh the log screen. Clear the log entries. Email the log immediately. Apply the current settings. Clear the current settings. Selecting Which Information to Log Besides the standard information listed previously, you can choose to log additional information. Those optional selections are as follows: • Attempted access to blocked site • Connections to the Web-based interface of the modem router • Modem Router operation (start up, get time, etc.) • Known DoS attacks and port scans Saving Log Files on a Server You can choose to write the logs to a computer running a syslog program. To activate this feature, select to the Broadcast on LAN radio button or enter the IP address of the server where the syslog file will be written. 4-10 v2.0, September 2007 Managing Your Network

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168

ADSL2+ Modem Wireless Router DG834G Reference Manual
4-10
Managing Your Network
v2.0, September 2007
Log action buttons are described in the following table.
Selecting Which Information to Log
Besides the standard information listed previously, you can choose to log additional information.
Those optional selections are as follows:
Attempted access to blocked site
Connections to the Web-based interface of the modem router
Modem Router operation (start up, get time, etc.)
Known DoS attacks and port scans
Saving Log Files on a Server
You can choose to write the logs to a computer running a syslog program. To activate this feature,
select to the
Broadcast on LAN
radio button or enter the IP address of the server where the syslog
file will be written.
Source IP
The IP address of the initiating device for this log entry.
Source port and
interface
The service port number of the initiating device, and whether it
originated from the LAN or WAN.
Destination
The name or IP address of the destination device or website.
Destination port and
interface
The service port number of the destination device, and whether it is on
the LAN or WAN.
Table 4-5.
Log Action Buttons
Field
Description
Refresh
Refresh the log screen.
Clear Log
Clear the log entries.
Send Log
Email the log immediately.
Apply
Apply the current settings.
Cancel
Clear the current settings.
Table 4-4.
Security Log Entry Descriptions
Field
Description