Netgear WNR2200 N300 Wireless Router with USB WNR2200 User Manual - Page 53
Viewing Logs of Web Access or Attempted Web Access, Send Logs According to this Schedule
UPC - 606449073416
View all Netgear WNR2200 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 53 highlights
N300 Wireless Router with USB WNR2200 User Manual a. Enter the name of your ISP's outgoing (SMTP) mail server (such as mail.myISP.com) in the Your Outgoing Mail Server field. You might be able to find this information in the configuration screen of your e-mail program. If you leave this field blank, log and alert messages will not be sent by e-mail. b. Enter the e-mail address to which logs and alerts are sent in the Send To This E-mail Address field. This e-mail address will also be used as the From address. If you leave this field blank, log and alert messages will not be sent by e-mail. 3. If your outgoing e-mail server requires authentication, select the My Mail Server requires authentication check box. a. Enter your user name for the outgoing e-mail server in the User Name field. b. Enter your password for the outgoing e-mail server in the Password field. 4. You can specify that logs are automatically sent by e-mail with these options: • Send alert immediately. Select this check box for immediate notification of attempted access to a blocked site or service. • Send Logs According to this Schedule. Specifies how often to send the logs: Hourly, Daily, Weekly, or When Full. - Day. Specifies which day of the week to send the log. Relevant when the log is sent weekly or daily. - Time. Specifies the time of day to send the log. Relevant when the log is sent daily or weekly. If you select the Weekly, Daily, or Hourly option and the log fills up before the specified period, the log is automatically e-mailed to the specified e-mail address. After the log is sent, the log is cleared from the router's memory. If the router cannot e-mail the log file, the log buffer might fill up. In this case, the router overwrites the log and discards its contents. 5. Click Apply to save your settings. So that the log entries are correctly time-stamped and sent at the correct time, be sure to set the time as described in the next section. Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of the websites you have accessed or attempted to access. Up to 256 entries are stored in the log. Log entries appear only when keyword blocking is enabled and no log entries are made for the trusted user. Protecting Your Network v1.0, September 2010 3-10