Page 176 / 218 Scroll up to view Page 171 - 175
ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
9-16
Firewall and Network Management
v1.0, October 2008
2.
From the
Date/Time
pull-down menu, choose the Local Time Zone.
This is required for scheduling work correctly. The VPN firewall includes a real-time clock
(RTC), which it uses for scheduling.
3.
If supported in your region, click
Automatically Adjust for Daylight Savings Time
.
4.
Select an NTP Server option:
Use Default NTP Servers
. The RTC is updated regularly by contacting a Netgear NTP
server on the Internet. A primary and secondary (backup) server are preloaded.
Use Custom NTP Servers
. If you prefer to use a particular NTP server, enter the name or
IP address of the NTP Server in the
Server 1 Name/IP Address
field. You can enter the
address of a backup NTP server in the
Server 2 Name/IP Address
field. If you select this
option and leave either the Server 1 or Server 2 fields empty, they will be set to the default
Netgear NTP servers.
5.
Click
Apply
to save your settings.
Figure 9-6
Note:
If you select the default NTP servers or if you enter a custom server FQDN, the
firewall must determine the IP address of the NTP server by a DNS lookup.
You must configure a DNS server address in the Network menu before the
firewall can perform this lookup.
Page 177 / 218
ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
Monitoring System Performance
11-1
v1.0, October 2008
Chapter 11
Monitoring System Performance
This chapter describes the full set of system monitoring features of your ProSafe Wireless-N VPN
Firewall. You can be alerted to important events such as {{WAN port rollover}}, WAN traffic
limits reached, and login failures and attacks. You can also view status information about the
firewall, WAN port, LAN ports, and VPN tunnels.
This chapter contains the following sections:
“Enabling the Traffic Meter”
“Activating Notification of Events and Alerts”
“Viewing Firewall Logs”
“Viewing Router Configuration and System Status”
“Monitoring the WAN Port Status”
“Monitoring Attached Devices”
“Reviewing the DHCP Log”
“Monitoring Active Users”
“Viewing Port Triggering Status”
“Monitoring VPN Tunnel Connection Status”
“Reviewing the VPN Logs”
Enabling the Traffic Meter
If your ISP charges by traffic volume over a given period of time, or if you want to study traffic
types over a period of time, you can activate the Traffic Meter for the WAN port.
To monitor traffic limits on the WAN port:
1.
Select
Monitoring > Traffic Meter
from the main/submenu, and then the WAN Traffic Meter
tab.
The
WAN Traffic Meter
screen will display.
Page 178 / 218
ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
11-2
Monitoring System Performance
v1.0, October 2008
2.
Enable the traffic meter by clicking the
Yes
radio box under
Do you want to enable Traffic
Metering on WAN?
The traffic meter will record the volume of Internet traffic passing
through the WAN. Select the following options:
No Limit.
Any specified restrictions will not be applied when traffic limit is reached.
Download only.
The specified restrictions will be applied to the incoming traffic only
Both Directions.
The specified restrictions will be applied to both incoming and outgoing
traffic only
Monthly Limit
. Enter the monthly volume limit and select the desired behavior when the
limit is reached.
Figure 11-1
Note:
Both incoming and outgoing traffic are included in the limit
Page 179 / 218
ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
Monitoring System Performance
11-3
v1.0, October 2008
Increase this month limit by
. Temporarily increase the Traffic Limit if you have reached
the monthly limit, but need to continue accessing the Internet. Select the checkbox and
enter the desired increase. (The checkbox will automatically be cleared when saved so that
the increase is only applied once.)
This month limit
. Displays the limit for the current month.
3.
In the
Traffic Counter
section, make your traffic counter selections:
Restart Traffic Counter Now
. Select this option and click Apply to restart the Traffic
Counter immediately.
Restart Traffic Counter at Specific Time
. Restart the Traffic Counter at a specific time
and day of the month. Fill in the time fields and choose AM or PM and the day of the
month from the pull-down menus.
Send e-mail report before restarting counter
. An E-mail report will be sent immediately
before restarting the counter. You must configure the E-mail screen in order for this
function to work (see
“E-Mail Notifications of Event Logs and Alerts” on page 5-27
).
4.
In the
When limit is reached
section, make the following choice:
Block all traffic
. All access to and from the Internet will be blocked.
Block all traffic except E-mail
. Only E-mail traffic will be allowed. All other traffic will
be blocked.
Send E-mail alert.
You must configure the E-mail screen in order for this function to
work. Go to the Firewall Logs and & E-mail Tab to set this up.
5.
Click
Apply
to save your settings.
The
Internet Traffic Statistics
section displays statistics on Internet Traffic via the WAN port.
If you have not enabled the Traffic Meter, these statistics are not available.
6.
Click the
Traffic by Protocol
link, in the upper right header, to see a report of the Internet
traffic by type. The volume of traffic for each protocol will be displayed in a popup window.
Traffic counters are updated in MBytes scale; the counter starts only when traffic passed is at
least 1MB.
Activating Notification of Events and Alerts
The Firewall Logs can be configured to log and then e-mail denial of access, general attack
information, and other information to a specified e-mail address. For example, your VPN firewall
will log security-related events such as: accepted and dropped packets on different segments of
Page 180 / 218
ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
11-4
Monitoring System Performance
v1.0, October 2008
your LAN; denied incoming and outgoing service requests; hacker probes and login attempts; and
other general information based on the settings you input on the
Firewall Logs & E-mail
menu. In
addition, if you have set up Content Filtering on the Block Sites screen (see
“Setting Block Sites
(Content Filtering)” on page 5-18
), a log will be generated when someone on your network tries to
access a blocked site.
You must have e-mail notification enabled to receive the logs in an e-mail message. If you don't
have e-mail notification enabled, you can view the logs by clicking the
View Logs
option arrow to
the right of the tab. Selecting all events will increase the size of the log, so it is good practice to
select only those events which are required
To configure logging and notifications:
1.
Select Monitoring from the main menu and Firewall Logs & E-mail
from the submenu.
The Firewall Logs & E-mail screen displays.
2.
Enter the name of the log in the
Log Identifier
field.
Log Identifier is a mandatory field used to identify which device sent the log messages. The
identifier is appended to log messages.
3.
In the
Routing Logs
section, select the network segments for which you would like logs to be
sent (for example, LAN to WAN under Dropped Packets).
4.
In the
System Logs
section, select the type of system events to be logged.
5.
Check
Yes
to enable E-mail Logs. Then enter:
a.
E-mail Server address
. Enter either the IP address or Internet name of your ISP’s
outgoing E-mail SMTP server. If you leave this box blank, no logs will be sent to you.
b.
Return E-mail Address
. Enter an e-mail address to appear as the sender.
c.
Send To E-mail Address
. Enter the e-mail address where the logs and alerts should be
sent. You must use the full e-mail address (for example, [email protected]).
6.
No Authentication
is selected by default. If your SMTP server requires user authentication,
select the required authentication type—either
Login Plain
or
CRAM-MD5
. Then enter the
user name and password to be used for authentication.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top