Firewall Local Log Page
Set up notification of the firewall event log in either of the following formats:
•
Individual e-mail alerts sent each time the firewall is under attack
•
Local log stored within the gateway and displayed on the Local Log page
Firewall Remote Log Page
Send firewall attack reports to a standard SysLog server so multiple instances can be logged over a period of time. Select individual attack or
configuration items to send to the SysLog server so that only the items of interest will be monitored. You can log permitted connections, blocked
connections, known Internet attack types, and CMRG configuration events. The SysLog server must be on the same network as the Private LAN
behind the Configuration Manager (typically 192.168.0.x).
behind the Configuration Manager (typically 192.168.0.x).
To activate the SysLog monitoring feature, check all desired event types to monitor and enter the last byte of the IP address of the SysLog
server. Normally, the IP address of this SysLog server is hard-coded so that the address does not change and always agrees with the entry on
this page.
FIELD
Permitted Connections
Blocked Connections
Known Internet Attacks
Product Configuration Events
To SysLog server at 192.168.0.x
SVG1202 Wireless Voice Gateway • User Guide
Field Description for the Firewall Remote Log Page
DESCRIPTION
Select to have the server e-mail you logs of who is connecting to your network.
Select to have the server e-mail you logs of who is blocked from
connecting to your network.
Select to have the server e-mail you logs of known Internet attacks against
your network.
Select to have the server e-mail you logs of the basic product configuration
events logs.
Enter the last digits from 10 to 254 of your SysLog server's IP address.
B
31