Linksys WAP200RF manual Administration Log Tab, Email Alert, Notification Queue Length

Page 42

Wireless-G Access Point with Power Over Ethernet and Rangebooster

The Administration - Log Tab

On this screen you can configure the log settings and alerts of particular events.

Log

You can have logs that keep track of the Access Point’s activities.

Email Alert

E-Mail Alert. If you want the Access Point to send e-mail alerts in the event of certain attacks, select Enabled. The default is Disabled.

E-Mail Address for Logs. Enter the e-mail address that will receive logs.

Notification Queue Length

Log Queue Length. You can designate the length of the log that will be e-mailed to you. The default is 20 entries.

Log Time Threshold. You can designate how often the log will be emailed to you. The default is 600 seconds (10 minutes).

Syslog Notification

Syslog is a standard protocol used to capture information about network activity. The Access Point supports this protocol and sends its activity logs to an external server. To enable Syslog, select Enabled. The default is Disabled.

Syslog Server IP Address. Enter the IP address of the Syslog server. In addition to the standard event log, the Access Point can send a detailed log to an external Syslog server. The Access Point’s Syslog captures all log activities and includes this information about all data transmissions: every connection source and destination IP address, IP server, and number of bytes transferred.

Log

Select the events that you want the Access Point to keep a log.

Unauthorized Login Attempt. If you want to receive alert logs about any unauthorized login attempts, click the checkbox.

Authorized Login. If you want to log authorized logins, click the checkbox.

Chapter 6: Configuring the Wireless-G Access Point

Figure 6-23: Administration - Log

36

The Administration - Log Tab

Image 42
Contents User Guide How to Use this User Guide Copyright and TrademarksTable of Contents Appendix a Troubleshooting Appendix B Wireless SecurityFrequently Asked Questions Example of a Simple Wireless Network List of Figures20 Security Monitor Basic Settings Introduction WelcomeWhat’s in this User Guide? Introduction What’s in this User Guide? Planning Your Wireless Network Network TopologyRoaming Network Layout Example of a simple wireless network Getting to Know the Wireless-G Access Point LEDsAccess Point’s port are located on the back of the device PortsDesktop Placement and Antenna Setup Antennas and PositionsConnecting the Wireless-G Access Point OverviewConnection Placement Options Stand OptionWall-Mount Option Setting Up the Wireless-G Access Point Accessing the UtilitySetup WirelessNavigating the Utility AP Mode AdministrationSecurity Monitor Status Basic Setup Configuring the Wireless-G Access PointSetup Basic Setup Tab Network SetupSetup Time Tab TimeWireless Basic Wireless Settings Tab Basic SettingsWireless Wireless Security Tab Wireless SecurityWPA-Personal aka WPA-PSK WPA2-PersonalWPA2-Personal Mixed WPA-EnterpriseWPA2-Enterprise WPA2-Enterprise MixedDisable RadiusWireless Client List Wireless Wireless Connection Control TabWireless Connection Control Connection ControlWireless Advanced Wireless Settings Tab Advanced SettingsWireless Vlan & QoS Tab VlanQoS AP Mode Tab MAC Address18 Wireless Repeater Mode 19 Wireless Bridge Mode Security Monitor Basic Settings Tab Wireless Security MonitorSecurity Monitor Accounts Security Monitor Event Log Tab Mail NotificationSyslog Notification Local AP Password Administration Management TabWeb Access ManagementSnmp IdentificationEmail Alert Administration Log TabLog Notification Queue LengthFactory Default Administration Factory Default TabAdministration Firmware Upgrade Tab Firmware UpgradeReboot Administration Reboot TabAdministration Config Management Tab Config ManagementStatus Local Network Tab InformationLocal Network Status Wireless Tab Wireless NetworkStatus System Performance Tab WiredWireless System PerformancePage Appendix a Troubleshooting Frequently Asked QuestionsWhat Ieee 802.11g features are supported? What is the ISM band? Does the Access Point function as a firewall? Appendix B Wireless Security Security PrecautionsSecurity Threats Facing Wireless Networks Appendix B Wireless Security Page Appendix C Upgrading Firmware Appendix D Windows Help Shared ResourcesNetwork Neighborhood/My Network Places Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix E Glossary Appendix F Specifications 802.11F Wireless Roaming11.g 54Mbps@ -72dBm, 11.b 11Mbps@ -85dBM Dhcp Client11g 14 dBm SecurityWireless Security Monitor Suspicious network eventsCertification Appendix G Warranty Information Limited WarrantyAppendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix H Regulatory Information Appendix I Contact Information Need to contact Linksys?Information section in this Guide