Page 231 / 331 Scroll up to view Page 226 - 230
Chapter 22 Certificates
VMG1312-B Series User’s Guide
231
Figure 132
Trusted CA: Import Certificate
The following table describes the fields in this screen.
Table 100
Trusted CA: Import Certificate
LABEL
DESCRIPTION
Certificate File
Path
Type in the location of the certificate you want to upload in this field or click
Browse ...
to
find it.
Enable Trusted
CA for 802.1x
Authentication
If you select this checkbox, the trusted CA will be used for 802.1x authentication. The
selected trusted CA will be displayed in the
Network Setting
>
Broadband
>
802.1x:
Edit
screen.
Certificate
Copy and paste the certificate into the text box to store it on the Device.
OK
Click
OK
to save your changes.
Cancel
Click
Cancel
to exit this screen without saving.
Page 232 / 331
VMG1312-B Series User’s Guide
232
C
HAPTER
23
Log
23.1
Overview
The web configurator allows you to choose which categories of events and/or alerts to have the
Device log and then display the logs or have the Device send them to an administrator (as e-mail)
or to a syslog server.
23.1.1
What You Can Do in this Chapter
Use the
System Log
screen to see the system logs (
Section 23.2 on page 233
).
Use the
Security Log
screen to see the security-related logs for the categories that you select
(
Section 23.3 on page 234
).
23.1.2
What You Need To Know
The following terms and concepts may help as you read this chapter.
Alerts and Logs
An alert is a type of log that warrants more serious attention. They include system errors, attacks
(access control) and attempted access to blocked web sites. Some categories such as
System
Errors
consist of both logs and alerts. You may differentiate them by their color in the
View Log
screen. Alerts display in red and logs display in black.
Syslog Overview
The syslog protocol allows devices to send event notification messages across an IP network to
syslog servers that collect the event messages. A syslog-enabled device can generate a syslog
message and send it to a syslog server.
Syslog is defined in RFC 3164. The RFC defines the packet format, content and system log related
information of syslog messages. Each syslog message has a facility and severity level. The syslog
facility identifies a file in the syslog server. Refer to the documentation of your syslog program for
details. The following table describes the syslog severity levels.
Table 101
Syslog Severity Levels
CODE
SEVERITY
0
Emergency: The system is unusable.
1
Alert: Action must be taken immediately.
2
Critical: The system condition is critical.
3
Error: There is an error condition on the system.
4
Warning: There is a warning condition on the system.
Page 233 / 331
Chapter 23 Log
VMG1312-B Series User’s Guide
233
23.2
The System Log Screen
Use the
System Log
screen to see the system logs. Click
System Monitor > Log
to open the
System Log
screen.
Figure 133
System Monitor > Log > System Log
The following table describes the fields in this screen.
5
Notice: There is a normal but significant condition on the system.
6
Informational: The syslog contains an informational message.
7
Debug: The message is intended for debug-level purposes.
Table 101
Syslog Severity Levels
CODE
SEVERITY
Table 102
System Monitor > Log > System Log
LABEL
DESCRIPTION
Level
Select a severity level from the drop-down list box. This filters search results according to
the severity level you have selected. When you select a severity, the Device searches
through all logs of that severity or higher.
Category
Select the type of logs to display.
Clear Log
Click this to delete all the logs.
Refresh
Click this to renew the log screen.
Export Log
Click this to export the selected log(s).
Email Log Now
Click this to send the log file(s) to the E-mail address you specify in the
Maintenance >
Logs Setting
screen.
System Log
#
This field is a sequential value and is not associated with a specific entry.
Time
This field displays the time the log was recorded.
Facility
The log facility allows you to send logs to different files in the syslog server. Refer to the
documentation of your syslog program for more details.
Level
This field displays the severity level of the logs that the device is to send to this syslog
server.
Messages
This field states the reason for the log.
Page 234 / 331
Chapter 23 Log
VMG1312-B Series User’s Guide
234
23.3
The Security Log Screen
Use the
Security Log
screen to see the security-related logs for the categories that you select.
Click
System Monitor > Log
> Security Log
to open the following screen.
Figure 134
System Monitor > Log > Security Log
The following table describes the fields in this screen.
Table 103
System Monitor > Log > Security Log
LABEL
DESCRIPTION
Level
Select a severity level from the drop-down list box. This filters search results according to
the severity level you have selected. When you select a severity, the Device searches
through all logs of that severity or higher.
Category
Select the type of logs to display.
Clear Log
Click this to delete all the logs.
Refresh
Click this to renew the log screen.
Export Log
Click this to export the selected log(s).
Email Log Now
Click this to send the log file(s) to the E-mail address you specify in the
Maintenance >
Logs Setting
screen.
#
This field is a sequential value and is not associated with a specific entry.
Time
This field displays the time the log was recorded.
Facility
The log facility allows you to send logs to different files in the syslog server. Refer to the
documentation of your syslog program for more details.
Level
This field displays the severity level of the logs that the device is to send to this syslog
server.
Messages
This field states the reason for the log.
Page 235 / 331
VMG1312-B Series User’s Guide
235
C
HAPTER
24
Traffic Status
24.1
Overview
Use the
Traffic Status
screens to look at network traffic status and statistics of the WAN, LAN
interfaces and NAT.
24.1.1
What You Can Do in this Chapter
Use the
WAN
screen to view the WAN traffic statistics (
Section 24.2 on page 235
).
Use the
LAN
screen to view the LAN traffic statistics (
Section 24.3 on page 236
).
Use the
NAT
screen to view the NAT status of the Device’s client(s) (
Section 24.4 on page 237
)
24.2
The WAN Status Screen
Click
System Monitor > Traffic Status
to open the
WAN
screen. The figure in this screen shows
the number of bytes received and sent on the Device.
Figure 135
System Monitor > Traffic Status > WAN

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top