Page 341 / 414 Scroll up to view Page 336 - 340
Monitor System Access and Performance
341
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Enable E-mail Logs
Do you want
logs to be
emailed to
you?
Select the
Yes
radio button to enable the wireless VPN firewall to email logs to a specified
email address. Complete the fields that are shown on the right side of the screen.
Select the
No
radio button to prevent the logs from being emailed, which is the default
setting.
E-Mail Server Address
The IP address or Internet name of your ISP’s outgoing email
SMTP server.
Note:
If you leave this field blank, the wireless VPN firewall cannot
send email logs and alerts.
Return E-Mail Address
The email address of the sender for email identification purposes.
For example, enter [email protected].
Send to E-Mail
Address
The email address to which the logs are sent. Typically, this is the
email address of the administrator.
Custom SMTP Port
Enter the port number of the SMTP server for the outgoing email.
Select one of the following radio buttons to specify SMTP server authentication for the
outgoing email:
No Authentication
. The SMTP server does not require authentication.
Login Plain
. The SMTP server requires authentication with regular login. Specify the
user name and password to be used for authentication.
CRAM-MD5
. The SMTP server requires authentication with CRAM-MD5 login. Specify
the user name and password to be used for authentication.
Username
The user name for SMTP server authentication.
Password
The password for SMTP server authentication.
Respond to Identd
from SMTP Server
To respond to Ident protocol messages, select the
Respond to
Identd from SMTP Server
check box. The Ident protocol is a
relatively weak scheme to verify the sender of an email. (A
common daemon program for providing the Ident service is
Identd.)
Send e-mail logs by Schedule
Unit
Enter a schedule for sending the logs. From the Unit drop-down list, select one of the
following:
Never
. No logs are sent.
Hourly
. The logs are sent every hour.
Daily
. The logs are sent daily. Specify the time.
Weekly
. The logs are sent weekly. Specify the day and time.
Day
From the Day drop-down list, select the day on which the logs are sent.
Time
From the Time drop-down, list select the hour on which the logs are sent, and then select
either the
a.m.
or
p.m.
radio button.
Table 83.
Firewall Logs & E-mail screen settings (continued)
Setting
Description
Page 342 / 414
Monitor System Access and Performance
342
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
3.
Click
Apply
to save your settings.
Note:
Enabling routing and other event logs might generate a significant
volume of log messages. NETGEAR recommends that you enable
firewall logs for debugging purposes only.
How to Send Syslogs over a VPN Tunnel between Sites
To send syslogs from one site to another over a gateway-to-gateway VPN tunnel:
1.
At Site 1, set up a syslog server that is connected to Gateway 1.
2.
Set up a VPN tunnel between Gateway 1 at Site 1 and Gateway 2 at Site 2.
3.
Change the remote IP address in the VPN policy on Gateway 1 to the WAN IP address of
Gateway 2.
4.
Change the local IP address in the VPN policy on Gateway 2 to the WAN IP address of
Gateway 2.
5.
At Site 2, specify that Gateway 2 should send the syslogs to the syslog server at Site 1.
Enable SysLogs
Do you want
to enable
syslog?
To enable the wireless VPN firewall to send logs to a specified syslog server, select the
Yes
radio button. Complete the fields that are shown on the right side of the screen.
To prevent the logs from being sent, select the
No
radio button, which is the default setting.
SysLog Server
The IP address or FQDN of the syslog server.
SysLog Severity
All the logs with a severity that is equal to and above the severity
that you specify are logged on the specified syslog server. For
example, if you select LOG_CRITICAL as the severity, then the
logs with the severities LOG_CRITICAL, LOG_ALERT, and
LOG_EMERG are logged.
Select one of the following syslog severities from the drop-down
list:
LOG DEBUG
. Debug-level messages.
LOG INFO
. Informational messages.
LOG NOTICE
. There are normal but significant conditions.
LOG WARNING
. There are warning conditions.
LOG ERROR
. There are error conditions.
LOG CRITICAL
. There are critical conditions.
LOG ALERT
. An action has to be taken immediately.
LOG EMERG
. The wireless VPN firewall is unusable.
Table 83.
Firewall Logs & E-mail screen settings (continued)
Setting
Description
Page 343 / 414
Monitor System Access and Performance
343
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
This section describes steps 2 through 4, using the topology that is described in the following
table:
Configure Gateway 1 at Site 1
To create a gateway-to-gateway VPN tunnel to Gateway 2, using the IPSec VPN wizard:
1.
Select
VPN > IPSec VPN > VPN Wizard
. The VPN Wizard screen displays.
2.
Configure a gateway-to-gateway VPN tunnel using the following information:
Connection name. Any name of your choice
Pre-shared key. Any key of your choice
Remote WAN IP address. 10.0.0.2
Local WAN IP address. 10.0.0.1
Remote LAN IP Address. 192.168.20.0
Remote LAN subnet mask. 255.255.255.0
3.
Click
Apply
to save the settings.
To change the remote IP address in the VPN policy:
1.
Select
VPN > IPSec VPN > VPN Policies
. The VPN Policy screen displays.
2.
Next to the policy name for the Gateway 1–to–Gateway 2 autopolicy, click
Edit
. The Edit
VPN Policy screen displays.
3.
In the General section of the screen, clear the
Enable NetBIOS
check box.
4.
In the Traffic Selector section of the screen, make the following changes:
From the Remote IP drop-down list, select
Single
.
In the Start IP fields, type
10.0.0.2
, which is the WAN IP address of Gateway 2.
5.
Click
Apply
to save the settings.
Configure Gateway 2 at Site 2
To create a gateway-to-gateway VPN tunnel to Gateway 1, using the IPSec VPN wizard:
1.
Select
VPN > IPSec VPN > VPN Wizard
. The VPN Wizard screen displays.
2.
Configure a gateway-to-gateway VPN tunnel using the following information:
Connection name. Any name of your choice
Pre-shared key. The same key as you configured on Gateway 1
Type of Address
Gateway 1 at Site 1
Gateway 2 at Site 2
WAN IP address
10.0.0.1
10.0.0.2
LAN IP address
192.168.10.0
192.168.20.0
LAN subnet mask
255.255.255.0
255.255.255.0
LAN IP address syslog server
192.168.10.2
Not applicable
Page 344 / 414
Monitor System Access and Performance
344
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
Remote WAN IP address. 10.0.0.1
Local WAN IP address. 10.0.0.2
Remote LAN IP Address. 192.168.10.0
Remote LAN subnet mask. 255.255.255.0
3.
Click
Apply
to save the settings.
To change the local IP address in the VPN policy:
1.
Select
VPN > IPSec VPN > VPN Policies
. The VPN Policy screen displays.
2.
Next to the policy name for the Gateway 2–to–Gateway 1 autopolicy, click
Edit
. The Edit
VPN Policy screen displays.
3.
In the General section of the screen, clear the
Enable NetBIOS
check box.
4.
In the Traffic Selector section of the screen, make the following changes:
From the Local IP drop-down list, select
Single
.
In the Start IP fields, type
10.0.0.2
, which is the WAN IP address of Gateway 2.
5.
Click
Apply
to save the settings.
To specify the syslog server that is connected to Gateway 1:
1.
Select
Monitoring > Firewall Logs & E-mail
. The Firewall Logs & E-mail screen
displays.
2.
Enable the syslog server and specify its IP address at Site 1. Enter
192.168.10.2
as the IP
address.
3.
Click
Apply
to save the settings.
Note:
The VPN tunnel should be established automatically, and the
syslogs should be sent to the syslog server at Site 1. You can use
the IPSec VPN Connection Status screen to verify the connection.
Page 345 / 414
Monitor System Access and Performance
345
ProSafe Wireless-N 8-Port Gigabit VPN Firewall FVS318N
View Status Screens
The wireless VPN firewall provides real-time information in a variety of status screens that
are described in the following sections:
View the System Status
View the VPN Connection Status and L2TP Users
View the VPN Logs
View the Port Triggering Status
View the WAN Port Status
View the Attached Devices and the DHCP Log
View the Status of a Wireless Profile
View the System Status
When you start up the wireless VPN firewall, the default screen that displays is the Router
Status screen.
The Router Status screen and Detailed Status screen provide real-time information about the
following important components of the wireless VPN firewall:
Firmware version
Both IPv4 and IPv6 WAN and LAN port information
Wireless information
Interface statistics
VLAN status, including port memberships
The Tunnel Status screen provides real-time information about the IPv6 tunnels.
These status screens are described in the following sections:
Router Status Screen
Router Statistics Screen
Detailed Status Screen
Tunnel Status Screen
Router Status Screen
To view the Router Status screen:
Select
Monitoring > Router Status
. The Router Status screen displays:

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top