Netgear SRX5308 SRX5308 Reference Manual - Page 283
Table 9-2. E-mail and Syslog Settings
UPC - 606449065145
View all Netgear SRX5308 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 283 highlights
ProSafe Gigabit Quad WAN SSL VPN Firewall SRX5308 Reference Manual 2. Enter the settings as explained in Table 9-2. Table 9-2. E-mail and Syslog Settings Setting Description (or Subfield and Description) Log Options Log Identifier Enter the name of the log in the Log Identifier field. The Log Identifier is a mandatory field used to identify which device sent the log messages. The identifier is appended to the log messages. The default identifier is SRX5308. Routing Logs From the Accepted Packets and Dropped Packets columns, select check boxes to specify which traffic is logged: • LAN to WAN • LAN to DMZ • DMZ to WAN • WAN to LAN • DMZ to LAN • WAN to DMZ System Logs Select the check boxes to specify which system events are logged: • Change of Time by NTP. Logs a message when the system time changes after a request from an NTP server. • Login Attempts. Logs a message when a login is attempted. Both successful and failed login attempts are logged. • Secure Login Attempts. Logs a message when a secure login is attempted. Both successful and failed secure login attempts are logged. • Reboots. Logs a message when the VPN firewall has been rebooted through the Web Management Interface. (No message is logged when the reset button has been pushed to reboot the VPN firewall.) • All Unicast Traffic. All incoming unicast packets are logged. • All Broadcast/Multicast Traffic. All incoming broadcast and multicast packets are logged. • WAN Status. WAN link status-related events are logged. • Resolved DNS Names. All resolved DNS names are logged. • VPN. All VPN events are logged. Other Event Logs Source MAC Filter Session Limit Bandwidth Limit Select this check box to log packets from MAC addresses that match the source MAC address filter settings (see "Enabling Source MAC Filtering" on page 4-44). Select this check box to log packets that are dropped because the session limit has been exceeded (see "Setting Session Limits" on page 4-29). Select this check box to log packets that are dropped because the bandwidth limit has been exceeded (see "Creating Bandwidth Profiles" on page 4-37). Monitoring System Access and Performance 9-7 v1.0, April 2010