Quick Reference Guide

ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN FVS336G Reference Manual
9-6 Monitoring System Performance
v1.0, January 2010
7. To respond to IDENT protocol messages, check the Respond to Identd from SMTP Server
box. The Ident Protocol is a weak scheme to verify the sender of e-mail (a common daemon
program for providing the ident service is identd).
8. In the Send E-mail logs by Schedule section , enter a Schedule for sending the logs. From the
Unit pull-down menu, choose: Never, Hourly, Daily, or Weekly. Then set the Day and Time
fields that correspond to your selection.
9. In the Enable SysLogs section, you can configure the VPN firewall to send system logs to an
external PC that is running a syslog logging program. Click Yes to enable SysLogs and send
messages to the syslog server, then:
a. Enter your SysLog Server IP address
b. Select the appropriate syslog facility from the SysLog Facility pull-down menu. The
SysLog Facility levels of severity are described in the table below.
10. Click Apply to save your settings.
Viewing the Logs
To view the logs:
1. Select Monitoring > Firewall Logs & E-mail from the menu. The Firewall Logs &
E-mail screen is displayed.
2. Click the View Log link in the upper right-hand section of the screen. The Logs screen is
displayed (see Figure 9-3 on page 9-7).
Table 9-1. SysLog Facility Levels of Severity
Severity Description
LOG EMERG Emergency: System is unusable
LOG ALERT Alert: Action must be taken immediately
LOG CRITICAL Critical: Critical conditions
LOG ERROR Error: Error conditions
LOG WARNING Warning: Warning conditions
LOG NOTICE Notice: Normal but significant conditions
LOG INFO Informational: Informational messages
LOG DEBUG Debug: Debug level messages