ProSecure Unified Threat Management (UTM) Appliance Reference Manual

Configuring and Activating Firewall Logs

You can configure the logging options for each network segment. For example, the UTM can log accepted packets for LAN-to-WAN traffic, dropped packets for WAN-to-DMZ traffic, and so on. You can also configure logging of packets from MAC addresses that match the source MAC address filter settings (see “Enabling Source MAC Filtering” on page 5-42), and packets that are dropped because the session limit (see “Setting Session Limits” on page 5-30), bandwidth limit (see “Creating Bandwidth Profiles” on page 5-38), or both, have been exceeded.

Note: Enabling firewall logs might generate a significant volume of log messages. NETGEAR recommends that you enable firewall logs for debugging purposes only.

To configure and activate firewall logs:

1.Select Monitoring > Logs & Reports from the menu. The Logs & Reports submenu tabs appear, with the Email and Syslog screen in view.

2.Click the Firewall Logs submenu tab. The Firewall Logs screen displays (see Figure 11-6).

Figure 11-6

3.Enter the settings as explained in Table 11-5 on page 11-14.

Monitoring System Access and Performance

11-13

v1.0, January 2010

Page 375
Image 375
NETGEAR UTM5-100NAS, UTM50-100NAS manual Configuring and Activating Firewall Logs