FVS338 ProSafe VPN Firewall 50 Re ference Manual
4-34 Firewall Protection and Content Filtering
v1.0, March 2008
To set up Firewall Logs and E-mail alerts:
1. Select Monitoring from the main me nu and th en Firewall Logs & E-mail from the submenu.
The Firewall Logs & E-mail screen will display.
2. Enter the name of the log in the Log Identifier field. Log Identifier is a mandatory field used
to identify the log messages. The ID appended to log messages.
3. Enter a Schedule for sending the logs. From the Unit pull-down menu, select: Never, Hourly,
Daily, or Weekly. Then fill in the Day and Time fields that correspond to your selection.
4. In the Security Logs section, check the network segment s radio box for which you would like
logs to be sent (for example, LAN to WAN under Dropped Pack ets).
5. In the System Logs section, check the radio box for the type of system events to be logged.
6. Check the Yes radio box to enable E-mail Logs. Then enter:
a. E-mail Server address – Enter the outgoing E-mail SMTP mail server address of your
ISP (for example, 172.16.1.10). If you leave this box blank, no logs will be sent to you.
b. Return E-mail Address – Enter the e-mail address of the user.
c. Send To E-mail AddressEnter the e-mail address where the logs and alerts should be
sent. You must use the full e-mail address (for example, ChrisXY@myISP.com).
7. The No Authentication radio box is checked by default. If your SMTP server authenticates
users, uncheck the radio box by selecting the authentication type—either Login Plain or
CRAM-MD5—based on your SMTP server requirements. Then enter the user name and
password to be used for authentication.
8. If you want to respo nd to IDENT protocol, check the Respond to Identd fr om SMTP Server
radio box. The Ident Protocol is an Internet protocol th at helps identify the user o f a particular
TCP connection (a common daemon program for providing the ident service is identd).
9. You can configure the firewall to send system logs to an external PC that is running a syslog
logging program. Click the Yes radio box to enable SysLogs and send messages to the syslog
server, then:
a. Enter your Syslog Server IP address
b. Select the appropriate syslog severity from the SysLog Severity pull-down menu. The
SysLog levels of severity are as follows:
LOG_EMERG (System is unusable)
LOG_ALERT (Action must be taken immediately)
LOG_CRITICAL (Critical conditions)
LOG_ERROR (Error conditions)