NETGEAR UTM5 Reference Manual page 441

Prosecure unified threat management appliance
Hide thumbs Also See for UTM5:
Table of Contents

Advertisement

ProSecure Unified Threat Management (UTM) Appliance
2.
Enter the settings as explained in the following table:
Table 110. Email and Syslog screen settings
Setting
Description
System Logs Option
Select the check boxes to specify which system events are logged:
Change of Time by NTP. Logs a message when the system time changes after a request from an NTP
server.
Secure Login Attempts. Logs a message when a secure login is attempted. Both successful and
failed login attempts are logged.
Reboots. Logs a message when the UTM has been rebooted through the web management interface.
(No message is logged when the factory default reset button has been pressed.)
All Unicast Traffic. All incoming unicast packets are logged.
All Broadcast/Multicast Traffic. All incoming broadcast and multicast packets are logged.
WAN Status. WAN link status–related events are logged.
Resolved DNS Names. All resolved DNS names are logged.
Email Logs to Administrator
Note:
When you have integrated a ReadyNAS with the UTM, the UTM cannot send the logs to an email
address.
Enable
Select this check box to enable the UTM to send a log file to an email address.
Send to
Frequency
Select Logs to
Send
The email address of the recipient of the log file.
Click Send Now to immediately send the logs, which you first need to
specify in the
Select Logs to Send
Select a radio button to specify how often the log file is sent:
Daily. Logs are sent daily at the time that you specify from the
drop-down lists (hours and minutes).
Weekly. Logs are sent weekly at the day and time that you specify from
the drop-down lists (weekday, hours, and minutes).
Select the check boxes to specify which logs are sent by email:
System Logs. The system event logs that you have specified in the
System Logs Options section at the top of the screen. However, by
default, many more types of events are logged in the system logs.
Traffic Logs. All scanned incoming and outgoing traffic.
Malware Logs. All intercepted viruses and malware threats.
Spam Logs. All intercepted spam.
Application Logs. All instant messaging, peer-to-peer and media
applications, and tools access violations.
Email filter Logs. All emails that are blocked because of file extension
and keyword violations.
Firewall Logs. The firewall logs that you have specified on the Firewall
Logs screen (see
Monitoring System Access and Performance
441
subsection (see later in this table).
Configure and Activate Firewall Logs
on page 448).

Advertisement

Table of Contents
loading

This manual is also suitable for:

Utm9sUtm10Utm150Utm25Utm50

Table of Contents