Netgear FVL328 参照マニュアル

ページ / 234
Model FVL328 ProSafe High-Speed VPN Firewall Reference Manual Revision 2
Protecting Your Network
5-19
May 2004, 202-10030-02
.
What to Include in the Event Log
Use these checkboxes to determine which events are included in the log. Checking all options will 
increase the size of the log, so it is good practice to disable any events which are not really 
required. 
All Web sites and news groups visited - If checked, all visited Web sites and newsgroups are 
logged. 
All Incoming TCP/UDP/ICMP traffic - If checked, all incoming TCP/UDP/ICMP connections 
and traffic is logged. 
All Outgoing TCP/UDP/ICMP traffic - If checked, all outgoing TCP/UDP/ICMP connections 
and traffic is logged. 
Other IP traffic - If checked, all other traffic (IP packets which are not TCP, UDP, or ICMP) is 
logged. 
Router operation (start up, get time, etc.) - If checked, Router operations, such as starting up 
and getting the time from the Internet Time Server, are logged. 
Connection to the Web-based interface of this Router - If checked, Administrator connections 
to the Web-based interface will be logged. 
Other connections and traffic to this Router - If checked, this will log traffic sent to this Router 
(rather than through this Router to the Internet). 
Allow duplicate log entries - If checked, then events or packets which fall within more than 
one (1) category above will have a log entry for each category in which they belong. This will 
generate a large number of log entries. If unchecked, then events or packets will only be 
logged once. Usually, this should be left unchecked. 
Logging programs are available for Windows, Macintosh, and Linux computers.
Enable one of these three options, as required: 
Table 5-1.
Log action buttons
Field
Description
Refresh
Refreshes the log screen.
Clear Log
Clears the log entries.
Send Log
E-mails the log immediately.