Cisco Small Business RV 120W Wireless-N VPN Firewall ...
Cisco Small Business RV 120W Wireless-N VPN Firewall ... Cisco Small Business RV 120W Wireless-N VPN Firewall ...
Administering Your Cisco RV120WConfiguring Logging7Configuring Logging PoliciesTo configure general logging policies:STEP 1STEP 2STEP 3STEP 4STEP 5STEP 6Choose Administration > Logging > Logging Policies.The Logging Policy Table shows the types of logging that are configured on thesystem. To add a new type of logging, click Add.Enter a name for the policy.(Optional) Check Enable to log IPSec VPN events.In the table, select the type of logs to capture for each severity. For example, youmight want to log all types of events that have a severity level of “Emergency,” soyou would check System, Kernel, and Wireless under “Emergency.”Click Save.Configuring Firewall LogsTo configure firewall logs:STEP 1STEP 2Choose Administration > Logging > Firewall Logs.Under the type of routing logs, check the box to choose one or both of thefollowing for each type:• Accepted Packets—Check this box to log packets that were successfullytransferred through the segment. This option is useful when the DefaultOutbound Policy is “Block” (see Configuring the Default Outbound Policy,page 67). For example, if Accept Packets is checked for LAN to WAN andthere is a firewall rule to allow ssh traffic from the LAN, then whenever aLAN machine tries to make an ssh connection, those packets will beaccepted and a message will be logged. (Make sure the log option is set toallow for this firewall rule.)• Dropped Packets—Check this box to log packets that were blocked frombeing transferred through the segment. This option is useful when theDefault Outbound Policy is “Allow” (see Configuring the Default OutboundPolicy, page 67). For example, if Dropped Packets is checked for LAN toWAN and there is a firewall rule to block ssh traffic from LAN, thenwhenever a LAN machine tries to make an ssh connection, those packetsCisco RV120W Administration Guide 127
Administering Your Cisco RV120WConfiguring Logging7will be dropped and a message will be logged. (Make sure the log option isset to allow for this firewall rule.)STEP 3Under the type of system logs, select the type of system events to be logged. Thefollowing system events can be recorded:• All Unicast Traffic—Check this box to log all unicast packets directed to therouter.• All Broadcast/Multicast Traffic—Check this box to log all broadcast ormulticast packets directed to the router.STEP 4Under “other events logs,” select the type of event to be logged. The followingevents can be recorded:• Source MAC Filter—Check this box to log packets matched due to sourceMAC filtering. Uncheck this box to disable source MAC filtering logs.• Bandwidth Limit—Check this box to log packets dropped due to BandwidthLimiting.STEP 5Click Save.Configuring Remote LoggingTo configure remote logging:STEP 1STEP 2STEP 3Choose Administration > Logging > Remote Logging Configuration.In the Remote Log Identifier field, enter a prefix to add to every logged messagefor easier identification of the source of the message. The log identifier will beadded to both e-mail and Syslog messages.Click Save.Cisco RV120W Administration Guide 128
- Page 85 and 86: Configuring the FirewallConfiguring
- Page 87 and 88: Configuring the FirewallConfiguring
- Page 89 and 90: Configuring the FirewallConfiguring
- Page 91 and 92: Configuring the FirewallConfiguring
- Page 93 and 94: Configuring the FirewallConfiguring
- Page 95 and 96: Configuring the FirewallConfiguring
- Page 97 and 98: Configuring the FirewallFirewall Co
- Page 99 and 100: Configuring the FirewallFirewall Co
- Page 101 and 102: 5Configuring Virtual Private Networ
- Page 103 and 104: Configuring Virtual Private Network
- Page 105 and 106: Configuring Virtual Private Network
- Page 107 and 108: Configuring Virtual Private Network
- Page 109 and 110: Configuring Virtual Private Network
- Page 111 and 112: Configuring Virtual Private Network
- Page 113 and 114: Configuring Virtual Private Network
- Page 115 and 116: Configuring Virtual Private Network
- Page 117 and 118: Configuring Virtual Private Network
- Page 119 and 120: Configuring Virtual Private Network
- Page 121 and 122: 6Configuring Quality of Service (Qo
- Page 123 and 124: Configuring Quality of Service (QoS
- Page 125 and 126: Configuring Quality of Service (QoS
- Page 127 and 128: Administering Your Cisco RV120WConf
- Page 129 and 130: Administering Your Cisco RV120WUsin
- Page 131 and 132: Administering Your Cisco RV120WConf
- Page 133 and 134: Administering Your Cisco RV120WConf
- Page 135: Administering Your Cisco RV120WCapt
- Page 139 and 140: Administering Your Cisco RV120WConf
- Page 141 and 142: Administering Your Cisco RV120WConf
- Page 143 and 144: Administering Your Cisco RV120WUpgr
- Page 145 and 146: 8Viewing the Cisco RV120W StatusThi
- Page 147 and 148: Viewing the Cisco RV120W StatusView
- Page 149 and 150: Viewing the Cisco RV120W StatusView
- Page 151 and 152: Viewing the Cisco RV120W StatusView
- Page 153 and 154: Viewing the Cisco RV120W StatusView
- Page 155 and 156: Viewing the Cisco RV120W StatusView
- Page 157 and 158: Viewing the Cisco RV120W StatusView
- Page 159 and 160: AUsing Cisco QuickVPN for Windows 7
- Page 161 and 162: Using Cisco QuickVPN for Windows 7,
- Page 163: BWhere to Go From HereCisco provide
Administering Your <strong>Cisco</strong> <strong>RV</strong><strong>120W</strong>Configuring Logging7will be dropped and a message will be logged. (Make sure the log option isset to allow for this firewall rule.)STEP 3Under the type of system logs, select the type of system events to be logged. Thefollowing system events can be recorded:• All Unicast Traffic—Check this box to log all unicast packets directed to therouter.• All Broadcast/Multicast Traffic—Check this box to log all broadcast ormulticast packets directed to the router.STEP 4Under “other events logs,” select the type of event to be logged. The followingevents can be recorded:• Source MAC Filter—Check this box to log packets matched due to sourceMAC filtering. Uncheck this box to disable source MAC filtering logs.• Bandwidth Limit—Check this box to log packets dropped due to BandwidthLimiting.STEP 5Click Save.Configuring Remote LoggingTo configure remote logging:STEP 1STEP 2STEP 3Choose Administration > Logging > Remote Logging Configuration.In the Remote Log Identifier field, enter a prefix to add to every logged messagefor easier identification of the source of the message. The log identifier will beadded to both e-mail and Syslog messages.Click Save.<strong>Cisco</strong> <strong>RV</strong><strong>120W</strong> Administration Guide 128