NETGEAR STM150 - ProSecure Web And Email Threat Management Appliance Reference Manual page 181

Web/email security threat management appliance
Hide thumbs Also See for STM150 - ProSecure Web And Email Threat Management Appliance:
Table of Contents

Advertisement

ProSecure Web/Email Security Threat Management (STM) Appliance
Table 52. Syslog Settings (Continued)
Setting
Description (or Subfield and Description)
Facility
The facility indicates from which internal part of the STM the log message originates. For
each log that you have selected to be sent to the syslog server (see earlier in this table),
select one of the following facilities from the drop-down list:
• auth. Security and authorization log messages.
• authpriv. Security and authorization log messages for sensitive information.
• cron. Clock daemon log messages.
• deamon. Other daemon log messages.
• ftp. FTP log messages.
• kern. Kernel log messages.
• local0 through local7. Locally defined log messages (1 through 7).
• lpr. Line printer subsystem log messages.
• mail. Mail subsystem log messages.
• news. Usenet news subsystem log messages.
• syslog. Log messages that are generated internally by the syslog server (syslogd).
• user. Generic user-level log messages.
• uucp. Unix-Unix copy (UUCP) subsystem log messages.
Priority
For each log that you have selected to be sent to the syslog server (see earlier in this table),
select one of the following severities from the drop-down list:
• emerg. The STM is unusable.
• alert. An action needs to be taken immediately.
• crit. There are critical conditions.
• err. There are error conditions.
• warning. There are warning conditions.
• notice. There are normal but significant conditions.
• info. Informational messages.
• debug. Debug-level messages.
Note:
logged on the specified syslog server. For example, if you select crit as the severity, then the
logs with the severities crit, alert, and emerg are logged.
4.
Click Apply to save your settings.
All the logs with a severity that is equal to and above the severity that you specify are
Chapter 6. Monitoring System Access and Performance
| 181

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure stm300Prosecure stm600

Table of Contents