Configure and Activate Firewall Logs
You can configure the logging options for each network segment. For example, the UTM can
log accepted packets for LAN-to-WAN traffic, dropped packets for WAN-to-DMZ traffic, and
so on. You can also configure logging of packets from MAC addresses that match the source
MAC address filter settings (see
that are dropped because the session limit (see
limit (see
Create Bandwidth Profiles
Note:
Enabling firewall logs might generate a significant volume of log
messages. NETGEAR recommends that you enable firewall logs for
debugging purposes only.
To configure and activate firewall logs:
1.
Select Monitoring > Logs & Reports > Firewall Logs. The Firewall Logs screen
displays:
Figure 256.
2.
Enter the settings as explained in the following table:
ProSecure Unified Threat Management (UTM) Appliance
Enable Source MAC Filtering
on page 160), or both, have been exceeded.
Monitoring System Access and Performance
on page 164), and packets
Set Session Limits
432
on page 150), bandwidth