NETGEAR UTM5EW-100NAS Appliance Reference Manual page 397

Unified threat management
Table of Contents

Advertisement

Table 11-15. Logs Query Settings (continued)
Setting
Log Type
(continued)
View All
Search Criteria
Monitoring System Access and Performance
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Description (or Subfield and Description)
• Service Logs. All events that are related to the status of scanning and filtering
services that are part of the Application Security main navigation menu. These
events include update success messages, update failed messages, network
connection errors, and so on.
• Malware. All intercepted viruses, spyware, and other malware threats.
• Email filters. All e-mails that are blocked because of file extension and
keyword violations.
• Content filters. All attempts to access blocked Web sites and URLs.
• IPS. All IPS events.
• Port Scan. All port scan events.
• Instant Messaging/Peer to Peer. All instant messaging and peer-to-peer
access violations.
• Firewall. The firewall logs that you have specified on the Firewall Logs screen
(see
"Configuring and Activating Firewall Logs" on page
• IPSEC VPN. All IPsec VPN events.
• SSL VPN. All SSL VPN events.
Select one of the following radio buttons:
• View All. Display or download the entire selected log.
• Search Criteria. Query the selected log by configuring the search criteria that
are available for the selected log.
Start Date/Time From the pull-down menus, select the year, month, day, hours,
and minutes for the start date and time.
This field is available for the following logs:
Traffic, Spam, Service, Malware, Email filters, Content filters,
Port Scan, IPS, Instant Messaging/Peer to Peer.
End Date/Time
From the pull-down menus, select the year, month, day, hours,
and minutes for the end date and time.
This field is available for the following logs:
Traffic, Spam, Service, Malware, Email filters, Content filters,
Port Scan, IPS, Instant Messaging/Peer to Peer.
Protocols
Select one or more checkboxes to specify the protocols that are
queried.
The following protocols can be selected:
• For Traffic and Malware logs: SMTP, POP3, IMAP, HTTP,
FTP, and HTTPS.
• For the Spam log: SMTP and POP3.
• For the Email filters log: SMTP, POP3, and IMAP.
• For the Content filters log: HTTP, FTP, and HTTPS.
v1.0, January 2010
11-13).
11-35

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prosecure

Table of Contents