Configuring And Activating Firewall Logs - NETGEAR UTM25-100NAS - Prosecure Utm Appliance 25U No Sub Included Reference Manual

Prosecure unified threat management
Table of Contents

Advertisement

ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual

Configuring and Activating Firewall Logs

You can configure the logging options for each network segment. For example, the UTM can log
accepted packets for LAN-to-WAN traffic, dropped packets for WAN-to-DMZ traffic, and so on.
You can also configure logging of packets from MAC addresses that match the source MAC
address filter settings (see
dropped because the session limit (see
(see
"Creating Bandwidth Profiles" on page
Note: Enabling firewall logs might generate a significant volume of log messages.
NETGEAR recommends that you enable firewall logs for debugging purposes
only.
To configure and activate firewall logs:
1. Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs
appear, with the Email and Syslog screen in view.
2. Click the Firewall Logs submenu tab. The Firewall Logs screen displays (see
Figure 11-6
3. Enter the settings as explained in
Monitoring System Access and Performance
"Enabling Source MAC Filtering" on page
"Setting Session Limits" on page
5-36), or both, have been exceeded.
Table 11-5 on page
v1.0, September 2009
5-40), and packets that are
5-23), bandwidth limit
11-14.
Figure
11-6).
11-13

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure utm10Prosecure utm25

Table of Contents