Remote Logging - Cisco Small Business Pro SA 520W Administration Manual

Small business pro sa 500 series security appliances
Hide thumbs Also See for Small Business Pro SA 520W:
Table of Contents

Advertisement

Administration
Configuring the Logging Options
STEP 3
STEP 1
STEP 2
STEP 3
Cisco SA 500 Series Security Appliances Administration Guide
For example, let's say that you want a record of every successful SSH
connection from the LAN to the WAN. You would check the LAN to WAN box
under Accepted Packets. Whenever a LAN machine makes an SSH
connection to the WAN, a message is logged. (This example assumes that
your default outbound policy is "Block Always" and you have enabled a
firewall rule to allow SSH traffic from the LAN to the WAN. The firewall rule
also must allow logging. For more information, see
Rules to Control Inbound and Outbound Traffic, page
Dropped Packets: Logs packets that were blocked from being transferred
through the segment. This option is useful when the Default Outbound Policy
is "Allow Always" (see the Firewall Rules page under the Firewall menu).
For example, let's say that you want a record of every blocked SSH
connection from the LAN to the WAN. You would check the LAN to WAN box
under Dropped Packets. Whenever a machine on the LAN attempts to make
an SSH connection to the WAN, a message is logged. This example assumes
that your default outbound policy is "Allow Always" and you have enabled a
firewall rule to block SSH traffic from the LAN to the WAN. The firewall rule
also must allow logging. For more information, see
Rules to Control Inbound and Outbound Traffic, page
Click Apply to save your settings, or click Reset to revert to the saved settings.

Remote Logging

Use this page to enable and configure email logs for various types of logs to a
specified email address or to a syslog server.
Click Administration on the menu bar, and then click Logging > Remote Logging
in the navigation tree.
The Remote Logging Config page appears.
In the Log Options area, enter a name to identify the device in the remote logs.
Every logged message will include this identifier as a prefix for easier
identification of the source of the message. The log identifier is added to email and
syslog messages.
In the Enable E-Mail Logs area, enter the following information:
Enable E-Mail Logs: Check this box to enable email logs.
9
Configuring Firewall
118.)
Configuring Firewall
118.
203

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Small business pro sa 540Small business pro sa 520

Table of Contents