NETGEAR UTM5EW-100NAS Appliance Reference Manual page 393

Unified threat management
Table of Contents

Advertisement

The Known PCs and Devices table contains a list of all known PCs and network devices that
are assigned dynamic IP addresses by the UTM, or have been discovered by other means.
Collectively, these entries make up the Network Database.
For each attached PC or device, the Known PCs and Devices table displays the following
fields:
Checkbox. Allows you to select the PC or device in the table.
Name. The name of the PC or device. For computers that do not support the NetBIOS
protocol, the name is displayed as "Unknown" (you can edit the entry manually to add a
meaningful name). If the PC or device was assigned an IP address by the DHCP server,
then the name is appended by an asterisk.
IP Address. The current IP address of the PC or device. For DHCP clients of the UTM,
this IP address does not change. If a PC or device is assigned a static IP address, you need
to update this entry manually after the IP address on the PC or device has changed.
MAC Address. The MAC address of the PC or device's network interface.
Group. Each PC or device can be assigned to a single LAN group. By default, a PC or
device is assigned to Group 1. You can select a different LAN group from the Group
pull-down menu in the Add Known PCs and Devices section or on the Edit Groups and
Hosts screen.
Action. The Edit table button that provides access to the Edit Groups and Hosts screen.
Note: If the UTM is rebooted, the data in the Known PCs and Devices table is lost
until the UTM rediscovers the devices.
Viewing the DHCP Log
To review the most recent entries in the DHCP log:
1. Select Network Config > LAN Settings from the menu. The LAN Settings submenu tabs
appear, with the LAN Setup screen in view (see
2. Click the DHCP Log option arrow at the top right of the LAN Setup screen. The DHCP Log
appears in a popup window (see
To view the most recent entries, click refresh. To delete all the existing log entries, click clear
log.
Monitoring System Access and Performance
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Figure 11-22 on page
v1.0, January 2010
Figure 11-20 on page
11-32).
11-30).
11-31

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents