EasyManuals Logo
Home>NETGEAR>Firewall>UTM5

NETGEAR UTM5 User Manual

NETGEAR UTM5
645 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #448 background imageLoading...
Page #448 background image
Monitoring System Access and Performance
448
ProSecure Unified Threat Management (UTM) Appliance
Configure and Activate Firewall Logs
You can configure the logging options for each network segment. For example, the UTM can
log accepted packets for LAN-to-WAN traffic, dropped packets for WAN-to-DMZ traffic, and
so on. You can also configure logging of packets from MAC addresses that match the source
MAC address filter settings (see Enable Source MAC Filtering on page 170), and packets
that are dropped because the session limit (see Set Session Limits on page 151), bandwidth
limit (see Create Bandwidth Profiles on page 162), or both, have been exceeded.
Note: Enabling firewall logs might generate a significant volume of log
messages. NETGEAR recommends that you enable firewall logs for
debugging purposes only.
 To configure and activate firewall logs:
1. Select Monitoring > Logs & Reports > Firewall Logs. The Firewall Logs screen
displays:
Figure 265.
2. Enter the settings as explained in the following table:

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the NETGEAR UTM5 and is the answer not in the manual?

NETGEAR UTM5 Specifications

General IconGeneral
BrandNETGEAR
ModelUTM5
CategoryFirewall
LanguageEnglish

Related product manuals