Page 91 / 296 Scroll up to view Page 86 - 90
Reference Manual for the ProSafe Wireless 802.11g
Firewall/Print Server Model FWG114P v2
Firewall Protection and Content Filtering
6-13
201-10301-02, May 2005
Note:
Enter the values in 24-hour time format. For example, 10:30 am would be 10 hours and 30
minutes and 10:30 pm would be 22 hours and 30 minutes.
Be sure to click Apply when you have finished configuring this menu.
Setting the Time Zone
The FWG114P v2 Wireless Firewall/Print Server uses the Network Time Protocol (NTP) to obtain
the current time and date from one of several Network Time Servers on the Internet. In order to
localize the time for your log entries, you must specify your Time Zone:
Time Zone. Select your local time zone. This setting will be used for the blocking schedule
and for time-stamping log entries.
Daylight Savings Time. Select this check box for daylight savings time.
Note
: If your region uses Daylight Savings Time, you must manually select Adjust for
Daylight Savings Time on the first day of Daylight Savings Time, and unselect it at the end.
Enabling Daylight Savings Time will add one hour to the standard time.
Be sure to click Apply when you have finished configuring this menu.
Getting E-Mail Notifications of Event Logs and Alerts
In order to receive logs and alerts by e-mail, you must provide your e-mail information in the
E-Mail subheading:
Page 92 / 296
Reference Manual for the ProSafe Wireless 802.11g
Firewall/Print Server Model FWG114P v2
6-14
Firewall Protection and Content Filtering
201-10301-02, May 2005
Figure 6-9:
E-mail menu
Turn e-mail notification on.
Select this check box if you want to receive e-mail logs and
alerts from the router.
Send alerts and logs by e-mail.
If you enable e-mail notification, these boxes cannot be
blank. Enter the name or IP address of your ISP’s outgoing (SMTP) mail server (such as
mail.myISP.com). You may be able to find this information in the configuration menu of your
e-mail program. Enter the e-mail address to which logs and alerts will be sent. This e-mail
address will also be used as the From address. If you leave this box blank, log and alert
messages will not be sent via e-mail. Check “My Mail Server requires authentication” if you
need to log in to your SMTP server in order to send e-mail. If this is checked, you must enter
the login name and password for your mail server.
Tip
: You used this information when you set up your e-mail program. If you cannot remember
it, check the settings in your e-mail program.
Send E-mail alerts immediately.
You can specify that logs are immediately sent to the
specified e-mail address when any of the following events occur:
Page 93 / 296
Reference Manual for the ProSafe Wireless 802.11g
Firewall/Print Server Model FWG114P v2
Firewall Protection and Content Filtering
6-15
201-10301-02, May 2005
If a Denial of Service attack is detected.
If a Port Scan is detected.
If a user on your LAN attempts to access a website that you blocked using Keyword
blocking.
Send logs according to this schedule.
You can specify that logs are sent to you according to a
schedule. Select whether you would like to receive the logs Hourly, Daily, Weekly, When Full,
or None for no logs. Depending on your selection, you may also need to specify:
Day for sending log
Relevant when the log is sent weekly or daily.
Time for sending log
Relevant when the log is sent daily or weekly.
If the Weekly, Daily or Hourly option is selected and the log fills up before the specified
period, the log is automatically e-mailed to the specified e-mail address. After the log is sent,
the log is cleared from the router’s memory. If the router cannot e-mail the log file, the log
buffer may fill up. In this case, the router overwrites the log and discards its contents.
Be sure to click Apply when you have finished configuring this menu.
Page 94 / 296
Reference Manual for the ProSafe Wireless 802.11g
Firewall/Print Server Model FWG114P v2
6-16
Firewall Protection and Content Filtering
201-10301-02, May 2005
Viewing Logs of Web Access or Attempted Web Access
The router will log security-related events, such as denied incoming and outgoing service requests,
hacker probes, and administrator logins. If you enable content filtering in the Block Sites menu,
the Log page will also show you when someone on your network tries to access a blocked site. If
you enabled e-mail notification, you will receive these logs in an e-mail message. If you do not
have e-mail notification enabled, you can view the logs here.
Figure 6-10:
Logs menu
See
Appendix D, “Firewall Log Formats
” for a full explanation of log entry formats.
Page 95 / 296
Reference Manual for the ProSafe Wireless 802.11g
Firewall/Print Server Model FWG114P v2
Firewall Protection and Content Filtering
6-17
201-10301-02, May 2005
Log action buttons are described in
Table 6-1
.
What to Include in the Event Log
Use these checkboxes to determine which events are included in the log. Checking all options will
increase the size of the log, so it is good practice to disable any events which are not really
required.
All Websites and news groups visited - If checked, all visited websites and newsgroups are
logged.
All Incoming TCP/UDP/ICMP traffic - If checked, all incoming TCP/UDP/ICMP connections
and traffic is logged.
All Outgoing TCP/UDP/ICMP traffic - If checked, all outgoing TCP/UDP/ICMP connections
and traffic is logged.
Other IP traffic - If checked, all other traffic (IP packets which are not TCP, UDP, or ICMP) is
logged.
Router operation (start up, get time, etc.) - If checked, Router operations, such as starting up
and getting the time from the Internet Time Server, are logged.
Connection to the Web-based interface of this Router - If checked, Administrator connections
to the Web-based interface will be logged.
Other connections and traffic to this Router - If checked, this will log traffic sent to this Router
(rather than through this Router to the Internet).
Allow duplicate log entries - If checked, then events or packets which fall within more than
one (1) category above will have a log entry for each category in which they belong. This will
generate a large number of log entries. If unchecked, then events or packets will only be
logged once. Usually, this should be left unchecked.
Logging programs are available for Windows, Macintosh, and Linux computers.
Table 6-1.
Log action buttons
Field
Description
Refresh
Refreshes the log screen.
Clear Log
Clears the log entries.
Send Log
E-mails the log immediately.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top