NETGEAR UTM5EW-100NAS Appliance Reference Manual page 159

Unified threat management
Table of Contents

Advertisement

Figure 5-27
3. Enter the settings as explained in
Table 5-9. IP/MAC Binding Settings
Setting
Email IP/MAC Violations
Do you want to
enable E-mail
Logs for IP/MAC
Binding Violation?
IP/MAC Bindings
Name
MAC Address
Firewall Protection
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Table
Description (or Subfield and Description)
Select one of the following radio buttons:
• Yes. IP/MAC binding violations are e-mailed.
• No. IP/MAC binding violations are not e-mailed.
Note: Click the Firewall Logs & E-mail page hyperlink to ensure that e-mailing of
logs is enabled on the Email and Syslog screen (see
and Event Notifications" on page
A descriptive name of the binding for identification and management purposes.
The MAC address of the PC or device that is bound to the IP address.
v1.0, January 2010
5-9.
11-5).
"Configuring Logging, Alerts,
5-45

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents