NETGEAR UTM5-100NAS Network Hardware User Manual


 
ProSecure Unified Threat Management (UTM) Appliance Reference Manual
Monitoring System Access and Performance 11-35
v1.0, January 2010
Log Type
(continued)
Service Logs. All events that are related to the status of scanning and filtering
services that are part of the Application Security main navigation menu. These
events include update success messages, update failed messages, network
connection errors, and so on.
Malware. All intercepted viruses, spyware, and other malware threats.
Email filters. All e-mails that are blocked because of file extension and
keyword violations.
Content filters. All attempts to access blocked Web sites and URLs.
IPS. All IPS events.
Port Scan. All port scan events.
Instant Messaging/Peer to Peer. All instant messaging and peer-to-peer
access violations.
Firewall. The firewall logs that you have specified on the Firewall Logs screen
(see “Configuring and Activating Firewall Logs” on page 11-13).
IPSEC VPN. All IPsec VPN events.
SSL VPN. All SSL VPN events.
View All Select one of the following radio buttons:
View All. Display or download the entire selected log.
Search Criteria. Query the selected log by configuring the search criteria that
are available for the selected log.
Search Criteria
Start Date/Time From the pull-down menus, select the year, month, day, hours,
and minutes for the start date and time.
This field is available for the following logs:
Traffic, Spam, Service, Malware, Email filters, Content filters,
Port Scan, IPS, Instant Messaging/Peer to Peer.
End Date/Time From the pull-down menus, select the year, month, day, hours,
and minutes for the end date and time.
This field is available for the following logs:
Traffic, Spam, Service, Malware, Email filters, Content filters,
Port Scan, IPS, Instant Messaging/Peer to Peer.
Protocols Select one or more checkboxes to specify the protocols that are
queried.
The following protocols can be selected:
For Traffic and Malware logs: SMTP, POP3, IMAP, HTTP,
FTP, and HTTPS.
For the Spam log: SMTP and POP3.
For the Email filters log: SMTP, POP3, and IMAP.
For the Content filters log: HTTP, FTP, and HTTPS.
Table 11-15. Logs Query Settings (continued)
Setting Description (or Subfield and Description)