NETGEAR UTM5 Reference Manual page 173

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance
Figure 100.
2.
Enter the settings as explained in the following table:
Table 37. IP/MAC Binding screen settings
Setting
Description
Email IP/MAC Violations
Do you want to
Select one of the following radio buttons:
enable E-mail Logs
for IP/MAC Binding
Violation?
IP/MAC Bindings
Name
A descriptive name of the binding for identification and management purposes.
MAC Address
The MAC address of the PC or device that is bound to the IP address.
IP Address
The IP address of the PC or device that is bound to the MAC address.
Log Dropped
To log the dropped packets, select Enable from the drop-down list. The default setting
Packets
is Disable.
3.
Click the Add table button. The new IP/MAC rule is added to the IP/MAC Bindings table.
4.
Click Apply to save your changes.
Yes. IP/MAC binding violations are emailed.
No. IP/MAC binding violations are not emailed.
Note:
Click the Email Notification link to ensure that emailing of logs is enabled on
the Email and Syslog screen (see
on page 438).
Firewall Protection
173
Configure Logging, Alerts, and Event Notifications

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents