Model FVS328 ProSafe VPN Firewall with Dial Back-up Reference Manual
Managing Your Network
8-9
December 2003, M-10041-01
Changing the Include in Log Settings
You can choose to log additional information. Those optional selections are as follows:
•
Known DoS attacks and Port Scans
•
Attempted access to blocked sites
•
All Web sites and news groups visited
•
All Incoming TCP/UDP/ICMP traffic
•
All Outgoing TCP/UDP/ICMP traffic
•
Other IP traffic — if selected, all other traffic (IP packets which are not TCP, UDP, or ICMP)
is logged
•
Router operation (start up, get time, etc.) — if selected, Router operations, such as starting up
and getting the time from the Internet Time Server, are logged.
•
Connection to the Web-based interface of this Router
•
Other connections and traffic to this Router — if selected, this will log traffic sent to this
Router (rather than through this Router to the Internet).
•
Allow duplicate log entries — if selected, events or packets that fall within more than one (1)
category above will have a log entry for each category in which they belong. This will
generate a large number of log entries.
If not selected, then events or packets will only be logged once. Usually, you should not allow
duplicate log entries.
Enabling the Syslog Feature
You can choose to write the logs to a computer running a SYSLOG program. To use this feature,
check the box under Syslog and enter the IP address of the server where the log file will be written.
Then click Apply to activate the Syslog feature.
For a detailed description of the log files, see
Appendix B, “Firewall Log Formats”
.