EasyManuals Logo

NETGEAR UTM9S Reference Manual

NETGEAR UTM9S
631 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #461 background imageLoading...
Page #461 background image
Monitoring System Access and Performance
461
ProSecure Unified Threat Management (UTM) Appliance
• Firewall. The firewall logs that you have specified on the Firewall Logs screen (see
Configure and Activate Firewall Logs on page 432).
• IPSec VPN. All IPSec VPN events.
• SSL VPN. All SSL VPN events.
You can query and generate each type of log separately and filter the information based on a
number of criteria. For example, you can filter the malware logs using the following criteria
(other log types have similar filtering criteria):
• Start date/time and end date/time
• Protocols (HTTP, HTTPS, FTP, SMTP, POP3, and IMAP)
• Malware name
• Action
• Domain
• User
• Client and server IP addresses
• Recipient email address
Querying logs is described in the following sections:
• Query and Download Logs
• Example: Use the Logs to Identify Infected Clients
• Log Management
Query and Download Logs
 To query and download logs:
1. Select Monitoring > Logs & Reports > Logs Query. The Logs Query screen displays.
(The following figure shows the Malware log information settings as an example.)
Depending on the selection that you make from the Log Type drop-down list, the screen
adjusts to display the settings for the selected type of log.

Table of Contents

Other manuals for NETGEAR UTM9S

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the NETGEAR UTM9S and is the answer not in the manual?

NETGEAR UTM9S Specifications

General IconGeneral
BrandNETGEAR
ModelUTM9S
CategoryNetwork Hardware
LanguageEnglish

Related product manuals