Netgear FVS336G FVS336G Reference Manual - Page 95

E-Mail Notifications of Event Logs and Alerts, Administrator Tips, Apply, Total

Page 95 highlights

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual 5. In the pull-down menu, select whether you will limit sessions by percentage or by absolute number. The percentage is computed based on the total connection capacity of the device.When setting a limit based on absolute number, note that some protocols (for example, FTP and RSTP) create two sessions per connection. 6. Click Apply. To monitor session limiting, return to this menu periodically and check the display of Total Number of Packets Dropped due to Session Limit, which indicates that session limits have been reached. E-Mail Notifications of Event Logs and Alerts The Firewall Logs can be configured to log and then e-mail denial of access, general attack information, and other information to a specified e-mail address. For example, your VPN firewall will log security-related events such as: accepted and dropped packets on different segments of your LAN; denied incoming and outgoing service requests; hacker probes and login attempts; and other general information based on the settings you input on the Firewall Logs & E-mail menu. In addition, if you have set up Content Filtering on the Block Sites screen (see "Blocking Internet Sites (Content Filtering)" on page 4-20), a log will be generated when someone on your network tries to access a blocked site. To configure e-mail or syslog notification, or to view the logs, see "Activating Notification of Events and Alerts" on page 9-4. Administrator Tips Consider the following operational items: 1. As an option, you can enable remote management if you have to manage distant sites from a central location (see "Enabling Remote Management Access" on page 8-10). 2. Although rules (see "Using Rules to Block or Allow Specific Kinds of Traffic" on page 4-2) are the basic way of managing the traffic through your system, you can further refine your control with the following optional features of the VPN firewall: • Groups and hosts (see "Managing Groups and Hosts (LAN Groups)" on page 3-5) • Services (see "About Services-Based Rules" on page 4-3) • Schedules (see "Setting a Schedule to Block or Allow Specific Traffic" on page 4-29) Firewall Protection and Content Filtering v1.2, June 2008 4-33

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
Firewall Protection and Content Filtering
4-33
v1.2, June 2008
5.
In the pull-down menu, select whether you will limit sessions by percentage or by absolute
number. The percentage is computed based on the total connection capacity of the
device.When setting a limit based on absolute number, note that some protocols (for example,
FTP and RSTP) create two sessions per connection.
6.
Click
Apply
.
To monitor session limiting, return to this menu periodically and check the display of
Total
Number of Packets Dropped due to Session Limit
, which indicates that session limits have been
reached.
E-Mail Notifications of Event Logs and Alerts
The Firewall Logs can be configured to log and then e-mail denial of access, general attack
information, and other information to a specified e-mail address. For example, your VPN firewall
will log security-related events such as: accepted and dropped packets on different segments of
your LAN; denied incoming and outgoing service requests; hacker probes and login attempts; and
other general information based on the settings you input on the
Firewall Logs & E-mail
menu. In
addition, if you have set up Content Filtering on the Block Sites screen (see
“Blocking Internet
Sites (Content Filtering)” on page 4-20
), a log will be generated when someone on your network
tries to access a blocked site.
To configure e-mail or syslog notification, or to view the logs, see
“Activating Notification of
Events and Alerts” on page 9-4
.
Administrator Tips
Consider the following operational items:
1.
As an option, you can enable remote management if you have to manage distant sites from a
central location (see
“Enabling Remote Management Access” on page 8-10
).
2.
Although rules (see
“Using Rules to Block or Allow Specific Kinds of Traffic” on page 4-2
)
are the basic way of managing the traffic through your system, you can further refine your
control with the following optional features of the VPN firewall:
Groups and hosts (see
“Managing Groups and Hosts (LAN Groups)” on page 3-5
)
Services (see
“About Services-Based Rules” on page 4-3
)
Schedules (see
“Setting a Schedule to Block or Allow Specific Traffic” on page 4-29
)