ProSafe Wireless-N VPN Firewall SRXN3205 Reference Manual
Monitoring System Performance
11-5
v1.0, October 2008
7.
To respond to IDENT protocol messages, check the
Respond to Identd from SMTP Server
radio box. The Ident Protocol is a weak scheme to verify the sender of e-mail (a common
daemon program for providing the ident service is identd).
8.
Enter a
Schedule
for sending the logs. From the
Unit
pull-down menu, choose: Never, Hourly,
Daily, or Weekly. Then set the Day and Time fields that correspond to your selection.
9.
You can configure the firewall to send system logs to an external PC that is running a syslog
logging program. Click
Yes
to enable SysLogs and send messages to the syslog server, then:
a.
Enter your
SysLog Server
IP address
b.
Select the appropriate syslog facility from the
SysLog Facility
pull-down menu. The
SysLog Facility levels of severity are described in the table below.
Figure 11-2