Netgear UTM9S – ProSECURE Unified Threat Management (UTM) Appliance with DSL and Wireless modules Manual De Referência
Monitoring System Access and Performance
432
ProSecure Unified Threat Management (UTM) Appliance
Configure and Activate Firewall Logs
You can configure the logging options for each network segment. For example, the UTM can
log accepted packets for LAN-to-WAN traffic, dropped packets for WAN-to-DMZ traffic, and
so on. You can also configure logging of packets from MAC addresses that match the source
MAC address filter settings (see
log accepted packets for LAN-to-WAN traffic, dropped packets for WAN-to-DMZ traffic, and
so on. You can also configure logging of packets from MAC addresses that match the source
MAC address filter settings (see
on page 164), and packets
that are dropped because the session limit (see
on page 150), bandwidth
limit (see
on page 160), or both, have been exceeded.
Note:
Enabling firewall logs might generate a significant volume of log
messages. NETGEAR recommends that you enable firewall logs for
debugging purposes only.
debugging purposes only.
To configure and activate firewall logs:
1.
Select Monitoring > Logs & Reports > Firewall Logs. The Firewall Logs screen
displays:
displays:
Figure 256.
2.
Enter the settings as explained in the following table: