Netgear FVS124G FVS124G Reference Manual - Page 106

Getting E-Mail Notifications of Event Logs and Alerts, E-Mail Logs subheading

Page 106 highlights

Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports Table 6-6. Port Triggering Item Description Port Triggering Rules • Enable - Indicates if the rule is enabled or disabled. Generally, there is no need to disable a rule unless it interferes with some other function such as Port Forwarding. • Name - The name for this rule. • Outgoing Ports - The port or port range for outgoing traffic. An outgoing connection using one of these ports will trigger this rule. • Incoming Ports - The port or port range used by the remote system when it responds to the outgoing request. A response using one of these ports will be forwarded to the PC which triggered this rule. Adding a new Rule • To add a new rule, click the Add and enter the following data on the resulting screen. • Name - enter a suitable name for this rule (e.g., the name of the application) • Enable/Disable - select the desired option. • Outgoing (Trigger) Port Range - enter the range of port numbers used by the application when it generates an outgoing request. • Incoming (Response) Port Range - enter the range of port numbers used by the remote system when it responds to the PC's request. Modifying or Deleting • Select the desired rule by clicking the radio button beside the rule. an existing Rule: • Click Edit or Delete as desired. Checking Operation and Status To see which rules are currently being used, click the Status button. The following data will be displayed: • Rule - the name of the Rule. • LAN IP Address - The IP address of the PC currently using this rule. • Open Ports - the Incoming ports which are associated the this rule. Incoming traffic using one of these ports will be sent to the IP address above. • Time Remaining - The time remaining before this rule is released, and thus available for other PCs. This timer is restarted whenever incoming or outgoing traffic is received. Getting E-Mail Notifications of Event Logs and Alerts Your router will log security-related events such as denied incoming service requests, hacker probes, and administrator logins, according to your settings on this screen. If you have set up content filtering on the Block Sites page (see "Block Sites" on page 6-24), you can also log when someone on your network tried to access a blocked site. In order to receive logs and alerts by e-mail, you must provide your e-mail information in the E-Mail Logs subheading: 6-30 Firewall Protection and Content Filtering 202-10085-01, March 2005

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238

Reference Manual for the ProSafe VPN Firewall 25 with 4 Gigabit LAN and Dual WAN Ports
6-30
Firewall Protection and Content Filtering
202-10085-01, March 2005
Getting E-Mail Notifications of Event Logs and Alerts
Your router will log security-related events such as denied incoming service requests, hacker
probes, and administrator logins, according to your settings on this screen.
If you have set up content filtering on the Block Sites page (see
“Block Sites” on page 6-24
), you
can also log when someone on your network tried to access a blocked site.
In order to receive logs and alerts by e-mail, you must provide your e-mail information in the
E-Mail Logs subheading:
Table 6-6.
Port Triggering
Item
Description
Port Triggering
Rules
Enable - Indicates if the rule is enabled or disabled. Generally, there is no need to
disable a rule unless it interferes with some other function such as Port Forwarding.
Name - The name for this rule.
Outgoing Ports - The port or port range for outgoing traffic. An outgoing connection
using one of these ports will trigger this rule.
Incoming Ports - The port or port range used by the remote system when it
responds to the outgoing request. A response using one of these ports will be
forwarded to the PC which triggered this rule.
Adding a new Rule
To add a new rule, click the Add and enter the following data on the resulting
screen.
Name - enter a suitable name for this rule (e.g., the name of the application)
Enable/Disable - select the desired option.
Outgoing (Trigger) Port Range - enter the range of port numbers used by the
application when it generates an outgoing request.
Incoming (Response) Port Range - enter the range of port numbers used by the
remote system when it responds to the PC's request.
Modifying or Deleting
an existing Rule:
Select the desired rule by clicking the radio button beside the rule.
Click Edit or Delete as desired.
Checking Operation
and Status
To see which rules are currently being used, click the Status button. The following
data will be displayed:
Rule - the name of the Rule.
LAN IP Address - The IP address of the PC currently using this rule.
Open Ports - the Incoming ports which are associated the this rule. Incoming traffic
using one of these ports will be sent to the IP address above.
Time Remaining - The time remaining before this rule is released, and thus
available for other PCs. This timer is restarted whenever incoming or outgoing
traffic is received.