A Log is a set of messages that describes system events. Each system event has different severity levels. The Logs can be saved locally on RAM, flash memory, and a remote log server of the device. Logs provide an administrator an alert when a feature is not working correctly, which allows the administrator to take action to correct them. A syslog server can separate the software that generates messages from the system that stores and analyzes them. This saves the resources of the device that generates the logs.
The objective of this document is to show you how to configure the log settings on a WRVS4400N Wireless-N Gigabit Security Router.
• WRVS4400N Wireless-N Gigabit Security Router
• 2.0.1.3
Step 1. Log in to the web configuration utility and choose Administration > Log. The Log page opens:
Step 1. In the Local Log area, check the Enable radio button to view the outgoing and incoming logs.
Step 2. Check the All check box or Individual (0,1,2,3,4,5,6,7) level check boxes to modify the setting of the log levels that the device records. The following describes the Log levels.
• Level 7 — Sends a debug message when there is an inconsistency is in the network.
• Level 6 — Sends an informational message about the current status of the network.
• Level 5 — Sends a message when the network is working normally but it has a significant condition.
• Level 4 — Sends a warning message when there is a problem condition is in the network.
• Level 3 — Sends an error message when a failure has occurred in the network.
• Level 2 — Sends a message when a critical condition is present in the network.
• Level 1 — Sends a message when an immediate action is needed.
• Level 0 — Sends a message when the system is unusable.
Step 3. Click the Enable radio button in the Outgoing Log field to enable the device to log all outgoing packets.
Step 4. (Optional) Click View Outgoing Table to view information on the outgoing packets including the Source IP, Destination IP, and Service or Port number.
The Outgoing Log window opens
Step 5. Click the Enable radio button in the Incoming Log field to enable the device to log all incoming packets.
Step 6. (Optional) Click View Incoming Table to view information on the incoming packets including the Source IP, Destination IP, and Service or Port number.
The Incoming Log window opens:
Step 7. Click Save to save the last changes.
Email Alerts are used by the administrator to control the logs that the system generates. These logs are sent to an email where the administrator can then take proper action.
Step 1. Click the Enable radio button in the Email Alerts field. This causes an email to be sent immediately if a DOS (Denial of Service) attack is detected. If enabled, fill in the email address information in the remaining fields in this section.
Step 2. In the Denial of Service Thresholds field, enter the number of Denial of Service attacks that must be detected before an email is sent out. The minimum value is 20. The maximum value is 100.
Step 3. In the Log Queue Length field, enter the number of entries to allow in the queue before a log is generated. The default is 50 entries.
Step 4. In the Log Time Threshold field, enter the interval, in minutes, at which you want an email to be sent. The default is 10 minutes.
Step 5. In the SMTP Mail Server field, enter the domain name or IP address that you use for outgoing email for the SMTP server.
Step 6. In the Port field, enter the port associated with the SMTP server for this connection.
Step 7. In the Alert Logs field, enter the email address to which the logs are sent.
Step 8. In the Return Email Address field, enter the email address you wish to appear as the address of the sender.
Step 9. (Optional) If your SMTP server requires authentication, check the Enable SMTP Authentication check box.
Timesaver: If SMTP authentication is disabled, skip to Step 13.
Step 10. Enter the username in the Username field. This is used for authentication of the SMTP server.
Step 11. Enter the password in the Password field. This is used for authentication of the SMTP server.
Step 12. (Optional) To test the email settings, click Email Log Now. This causes the log to be emailed immediately.
Step 13. Click Save to save the last changes.
Step 1. Click the Enable radio button to enable the Syslog standard.
Step 2. Enter the domain name or IP address of the syslog server in the Syslog Server field.
Step 3. Click Save to save the last changes.
The output blocking event log is used to block possible messages that the system can generate when the firmware is not working properly. This is very useful for the administrator because it gives an alert when the device is not working with the previous firmware or when the firmware fails.
Step 1. Click Enable in the Output Blocking Event Log field to enable output blocking feature.
Step 2. Click Save to save the last changes.
The Local Log is used for the administrator to generate logs locally in the network.
Step 1. Click the Enable radio button in the Local Log field. This allows you to view a log of all incoming and outgoing logs.
Step 2. Click the View Log button to view the logs.
The All Log window appears. This shows the local logs that have been generated on the router.
Step 3. Click Save to save the log settings.