Chapter 9:
Monitoring System Performance
|
151
ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336Gv2 Reference Manual
login attempts; and other general information based on the settings that you enter on the
Firewall Logs & E-mail screen. You must have e-mail notification enabled to receive the logs
in an e-mail message. If you don't have e-mail notification enabled, you can view the logs by
clicking the
View Logs
option arrow to the right of the tab. Selecting all events will increase
the size of the log, so it is good practice to select only those events which are required.
To configure logging and notifications:
1.
Select Monitoring > Firewall Logs & E-mail from the menu. The Firewall Logs &
E-mail screen is displayed.
2.
In the Log Options section of the
screen, enter the name of the
log in the
Log Identifier
field.
This is a mandatory field used to
identify which device sent the
log messages. The identifier is
appended to log messages.
3.
In the
Routing Logs
section,
select the network segments for
which you would like logs to be
sent (for example, LAN to WAN
under Dropped Packets).
4.
In the
System Logs
section and
the
Other Event Logs
section,
select the type of events to be
logged.
5.
In the
Enable E-Mail Logs
section, select the
Yes
radio
button to enable e-mail logs.
Then enter:
a.
E-mail Server address
.
Enter either the IP address or
Internet name of your ISP’s
outgoing E-mail SMTP
server. If you leave this field
blank, no logs will be sent.
b. Return E-mail Address
.
Enter an e-mail address to
appear as the sender.
c. Send To E-mail Address
. Enter the e-mail address where the logs and alerts
should be sent. You must use the full e-mail address (for example,
6.
No Authentication
is selected by default. If your SMTP server requires user
authentication, select the required authentication type—either
Login Plain
or
CRAM-MD5
. Then enter the user name and password to be used for authentication.
7.
To respond to IDENT protocol messages, check the
Respond to Identd from SMTP
Server
box. The Ident Protocol is a weak scheme to verify the sender of e-mail (a
common daemon program for providing the ident service is identd).