ProSafe 802.11g Wireless VPN Firewall FVG318 Reference Manual
Firewall Protection and Content Filtering 4-17
v1.0, September 2007
Enter the Return E-Mail Address to which logs and alerts are sent. This e-mail address
will also be used as the Send To E-mail address. If you leave this box blank, log and alert
messages will not be sent via e-mail.
7. If the SMTP server requires authentication before accepting connections, select either Login
Plain or CRAM-MD5 and enter the User Name and Password to be used for authentication.
To disable authentication, select the No Authentication radio box (default).
8. Check the Respond to Identd from SMTP Server radio box to configure the router to
respond to an IDENT request from the SMTP server.
9. In the Send logs according to this schedule section, you can specify that logs are sent to you
according to a schedule. From the Unit pull-down menu, select to receive logs Never, Hourly,
Daily, or Weekly. Depending on your selection, specify:
Day for sending log
Relevant when the log is sent weekly or daily.
Time for sending log
Relevant when the log is sent daily or weekly.
10. If you want the router to send logs to a SysLog server, select the Yes radio box in the Enable
SysLogs section and input the following fields:
a. SysLog Server. Enter the IP address or Internet Name of the SysLog server.
b. SysLog Facility. Select the appropriate syslog facility (Local0 to Local7).
11. Click Apply to save your settings.
The firewall logs security-related events such as denied incoming and outgoing service requests,
hacker probes, and administrator logins. If you enable content filtering in the Block Sites menu,
the Log page will also show you when someone on your network tried to access a blocked site. If
you enabled e-mail notification, you will receive these logs in an e-mail message. If you don't have
e-mail notification enabled, you can view the logs, as well as e-mail the logs by clicking the View
Log link on the Firewall Logs & E-mail screen.
Note: You can configure the firewall to send system logs to an external PC that is
running a syslog logging program. Logging programs are available for
Windows, Macintosh, and Linux computers.