Unified Services Router
User Manual
164
Figure 113: Facility se ttings for Logging
The display for logging can be customized based on where the logs are sent, either
the Event Log viewer in the GUI (the Event Log viewer is in the
Status > Logs
page) or a remote Syslog server for later review. E-mail logs, discussed in a
subsequent section, follow the same configuration as logs configured for a Syslog
server.
Tools > Log Settings > Logs Configuration
This page allows you to determine the type of traffic through the router that is
logged for display in Syslog, E-mailed logs, or the Event Viewer. Denial of service
attacks, general attack information, login attempts, dropped packets, and similar
events can be captured for review by the IT administrator.
Traffic through each network segment (LAN, WAN, DMZ) can be tracked based on
whether the packet was accepted or dropped by the firewall.
Accepted Packets are those that were successfully transferred through the
corresponding network segment (i.e. LAN to WAN). This option is particularly
useful when the Default Ou
tbound Policy is “Block Always” so the
IT admin can
monitor traffic that is passed through the firewall.
Example: If Accept Packets from LAN to WAN is enabled and there is a
firewall rule to allow SSH traffic from LAN, then whenever a LAN machine