Page 146 / 178 Scroll up to view Page 141 - 145
FVS338 ProSafe VPN Firewall 50 Reference Manual
6-18
Router and Network Management
v1.0, September 2006
Setting Login Failures and Attacks Notification
Figure 6-8
shows the
Firewall Logs & E-mail
screen that is invoked by selecting
Monitoring
from the main menu and selecting
Firewall Logs & E-mail
from the submenu.
You can send a System log of firewall activities to an email address or a log of the firewall
activities can be viewed, saved to a syslog server, and then sent to an email address. You can view
the logs by clicking
View Logs.
Figure 6-7
Page 147 / 178
FVS338 ProSafe VPN Firewall 50 Reference Manual
Router and Network Management
6-19
v1.0, September 2006
Figure 6-8
Select the types of
Enable email alerts.
events to email.
View System Logs
Select the segments
to track for System
Log events.
Syslog Server
enabled
Page 148 / 178
FVS338 ProSafe VPN Firewall 50 Reference Manual
6-20
Router and Network Management
v1.0, September 2006
Monitoring Attached Devices
The
Groups and Hosts
menu contains a table of all IP devices that the VPN firewall has
discovered on the local network. Select
Network Configuration
from the main menu and
LAN
Groups
from the submenu. The
Groups and Hosts
screen will display.
The network database is an automatically-maintained list of all known PCs and network devices.
PCs and devices become known by the following methods:
DHCP Client Requests
– By default, the DHCP server in this Router is enabled, and will
accept and respond to DHCP client requests from PCs and other network devices. These
requests also generate an entry in the network database. Because of this, leaving the DHCP
Server feature enabled (on the LAN Setup screen) is strongly recommended.
Scanning the Network
– The local network is scanned using standard methods such as ARP.
This will detect active devices which are not DHCP clients. However, sometimes the name of
the PC or device cannot be accurately determined and will be shown as Unknown.
The
Known PCs and Devices
table lists all current entries in the network database. For each PC
or device, the following data is displayed.
Figure 6-9
Page 149 / 178
FVS338 ProSafe VPN Firewall 50 Reference Manual
Router and Network Management
6-21
v1.0, September 2006
Viewing Port Triggering Status
You can view the status of Port Triggering by selecting
Security
from the main menu and
Port
Triggering
from the submenu. When the
Port Triggering
screen display, click the
Status
link.
Table 6-1.
Known PCs and Devices
Item
Description
Name
The name of the PC or device. Sometimes, this can not be determined, and will be
listed as Unknown. In this case, you can edit the entry to add a meaningful name.
IP Address
The current IP address. For DHCP clients, where the IP address is allocated by the
DHCP Server in this device, this IP address will not change. Where the IP address is
set on the PC (as a fixed IP address), you may need to update this entry manually if
the IP address on the PC is changed.
MAC Address
The MAC address of the PC. The MAC address is a low-level network identifier which
is fixed at manufacture.
Group
Each PC or device must be in a single group. The Group column indicates which
group each entry is in. By default, all entries are in the Group1.
Note:
If the VPN firewall is rebooted, the table data is lost until the VPN firewall
rediscovers the devices.
Figure 6-10
Page 150 / 178
FVS338 ProSafe VPN Firewall 50 Reference Manual
6-22
Router and Network Management
v1.0, September 2006
Viewing Router Configuration and System Status
The Router Status menu provides status and usage information. From the main menu of the
browser interface, click on
Management
, then select
Router Status
, The
Router Status
screen
will display.
Table 6-2.
Port Triggering Status data
Item
Description
Rule
The name of the Rule.
LAN IP Address
The IP address of the PC currently using this rule.
Open Ports
The Incoming ports which are associated the this rule. Incoming traffic using one of
these ports will be sent to the IP address above.
Time Remaining
The time remaining before this rule is released, and thus available for other PCs.
This timer is restarted whenever incoming or outgoing traffic is received.
Figure 6-11

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top