Network Router User Manual

Chapter 4
Advanced Configuration
47
4-Port SSL/IPSec VPN Router
SNMPv3
Select this option if you want to use SNMPv3. Then
configure the following:
User Name Enter the name of the user who receives
SNMP notifications.
Security Level Select No Authentication if no
authentication or privacy security levels are specified.
Select Authentication if SNMP message origins are
authenticated. Select Privacy SNMP messages are
authenticated and encrypted.
Click Add to List, and configure as many entries as you
would like, up to a maximum of 10.
SNMPv1,2 Table
The SNMPv1,2 entries are listed. To delete an entry, select
it and click Delete.
SNMPv3 Table
The SNMPv3 entries are listed. To delete an entry, select it
and click Delete.
Click Save Settings to save your changes, or click Cancel
Changes to undo them.
Log > System Log
Configure the Router’s log settings, so you can specify
how you want its activity logs handled.
Log > System Log
System Log
Syslog
Syslog is a standard protocol used to capture information
about network activity. The Router supports this protocol
and can send its activity logs to an external server.
Enable Syslog Select this option to enable the Routers
Syslog feature.
Syslog Server In addition to the standard event log,
the Router can send a detailed log to an external Syslog
server. The Router’s Syslog captures all log activities and
includes this information about all data transmissions:
every connection source and destination IP address, IP
service, and number of bytes transferred. Enter the Syslog
server name or IP address. Click Save Settings to save
your changes, and then restart the Router for the changes
to take effect.
E-mail
You may want logs or alert messages to be e-mailed to
you. If so, then configure the E-mail settings.
Enable E-Mail Alert Select this option to enable the
Routers E-Mail Alert feature.
Mail Server If you want any log or alert information
e-mailed to you, then enter the name or numerical IP
address of your SMTP server. Your ISP can provide you
with this information.
Send E-mail to Enter the e-mail address that will
receive your log files. If you do not want copies of the log
information e-mailed to you, then leave this field blank.
Enable E-Mail Authentication Select this option to
enable the Routers E-Mail Authentication feature.
User Name Enter the user name for authentication.
Password Enter the password for authentication.
Log Queue Length You can designate the length of the
log that will be e-mailed to you. The default is 50 entries,
so unless you change this setting, the Router will e-mail
the log to you when there are more than 50 log entries.
Log Time Threshold You can designate how often the
log will be e-mailed to you. The default is 10 minutes, so
unless you change this setting, the Router will e-mail the
log to you every 10 minutes.
The Router will e-mail the log every time the Log Queue
Length or Log Time Threshold is reached.
E-mail Log Sorting Logs have different severity levels.
The higher the severity level, the more critical the log is
(the highest level is Severity0_Emergency). Select the
minimum severity level of logs that are e-mailed. Log
events with equal or higher severity level will also be