Page 151 / 203 Scroll up to view Page 146 - 150
Chapter 9:
Monitoring System Performance
|
151
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
login attempts; and other general information based on the settings that you enter on the
Firewall Logs & E-mail screen. You must have e-mail notification enabled to receive the logs
in an e-mail message. If you don't have e-mail notification enabled, you can view the logs by
clicking the
View Logs
option arrow to the right of the tab. Selecting all events will increase
the size of the log, so it is good practice to select only those events which are required.
To configure logging and notifications:
1.
Select Monitoring > Firewall Logs & E-mail from the menu. The Firewall Logs &
E-mail screen is displayed.
2.
In the Log Options section of the
screen, enter the name of the
log in the
Log Identifier
field.
This is a mandatory field used to
identify which device sent the
log messages. The identifier is
appended to log messages.
3.
In the
Routing Logs
section,
select the network segments for
which you would like logs to be
sent (for example, LAN to WAN
under Dropped Packets).
4.
In the
System Logs
section and
the
Other Event Logs
section,
select the type of events to be
logged.
5.
In the
Enable E-Mail Logs
section, select the
Yes
radio
button to enable e-mail logs.
Then enter:
a.
E-mail Server address
.
Enter either the IP address or
Internet name of your ISP’s
outgoing E-mail SMTP
server. If you leave this field
blank, no logs will be sent.
b. Return E-mail Address
.
Enter an e-mail address to
appear as the sender.
c. Send To E-mail Address
. Enter the e-mail address where the logs and alerts
should be sent. You must use the full e-mail address (for example,
6.
No Authentication
is selected by default. If your SMTP server requires user
authentication, select the required authentication type—either
Login Plain
or
CRAM-MD5
. Then enter the user name and password to be used for authentication.
7.
To respond to IDENT protocol messages, check the
Respond to Identd from SMTP
Server
box. The Ident Protocol is a weak scheme to verify the sender of e-mail (a
common daemon program for providing the ident service is identd).
Page 152 / 203
152
|
Chapter 9:
Monitoring System Performance
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
8.
In the
Send E-mail logs by Schedule
section , enter a Schedule for sending the logs.
From the
Unit
drop-down list, choose:
Never
,
Hourly
,
Daily
, or
Weekly
. Then set the
Day and Time fields that correspond to your selection.
9.
In the
Enable SysLogs
section, you can configure the network storage to send system
logs to an external PC that is running a syslog logging program. Click
Yes
to enable
SysLogs and send messages to the syslog server, then:
a.
Enter your
SysLog Server
IP address
b.
Select the appropriate syslog facility from the
SysLog Facility
drop-down list. The
SysLog Facility levels of severity are described in the table below.
10.
Click
Apply
to save your settings.
Table 9-1.
SysLog Facility Levels of Severity
Severity
Description
LOG EMERG
Emergency: System is unusable
LOG ALERT
Alert: Action must be taken immediately
LOG CRITICAL
Critical: Critical conditions
LOG ERROR
Error: Error conditions
LOG WARNING
Warning: Warning conditions
LOG NOTICE
Notice: Normal but significant conditions
LOG INFO
Informational: Informational messages
LOG DEBUG
Debug: Debug level messages
Page 153 / 203
Chapter 9:
Monitoring System Performance
|
153
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
Viewing the Logs
To view the logs, select Monitoring > Firewall Logs & E-mail from the menu, and then click
the
View Log
link in the upper right-hand section of the screen. The Logs screen is
displayed.
If the E-mail Logs option has been enabled on the Firewall Logs & E-mail screen, you can
send a copy of the log by clicking
Send Log
.
Click
Refresh Log
to retrieve the latest update; click
Clear Log
to delete all entries.
Log entries are described in the following table.
Table 9-2.
Firewall Logs Field Descriptions
Field
Description
Date and Time
The date and time the log entry was recorded.
Description or Action
The type of event and what action was taken if any.
Source IP
The IP address of the initiating device for this log entry.
Source port and
interface
The service port number of the initiating device, and whether it
originated from the LAN or WAN.
Destination
The name or IP address of the destination device or website.
Destination port and
interface
The service port number of the destination device, and whether it’s on
the LAN or WAN.
Page 154 / 203
154
|
Chapter 9:
Monitoring System Performance
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
Viewing VPN Firewall Configuration and System
Status
The Router Status screen provides status and usage information. To view the network
storage configuration and system status:
Select Monitoring > Router Status from the menu.
The following information is displayed.
Table 9-3.
Router Status Information
Item
Description
System Name
This is the Account Name that you entered on the WAN ISP Settings screen.
Firmware Version
This is the current software the network storage is using. This will change if you
upgrade your network storage.
LAN Port
Displays the current settings for MAC address, IP address, DHCP status and IP
Subnet Mask that you set in the LAN IP Setup screen. DHCP can be either Enabled
or Disabled.
Page 155 / 203
Chapter 9:
Monitoring System Performance
|
155
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
Monitoring VPN Firewall Statistics
To display the network storage statistics:
1.
Select Monitoring > Router Status
from the menu.
The Router Status screen is
displayed.
2.
Click the
Show Statistics
link in the upper right-hand section of the screen. The Router
Statistics screen is displayed.
For each interface, this shows the number of transmitted and received packets, number of
collided packets, transmitted and received Bytes per second, and the interface up-time.
To set the poll interval:
1.
Click the
Stop
button.
2.
From the
Poll Interval
drop-down list, select a new interval (the minimum is 5 seconds,
the maximum is 5 minutes).
3.
Click the
Set Interval
button.
WAN1 Configuration
WAN Mode: Single, Dual, or Rollover.
WAN State: UP or DOWN.
NAT: Enabled or Disabled.
Connection Type: Static IP, DHCP, PPPoE, or PPTP.
Connection State: Connected or Disconnected.
WAN IP Address: The IP address of the WAN interface.
Subnet Mask: The IP subnet mask of the WAN interface.
Gateway: The gateway IP address for the WAN interface.
Primary DNS: The IP address of the primary DNS server for the WAN interface.
Secondary DNS: The IP address of the secondary DNS server for the WAN
interface.
MAC Address: The MAC address of the WAN interface.
WAN2 Configuration
Displays the same details as for the WAN1 Configuration.
Table 9-3.
Router Status Information (Continued)
Item
Description

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top