PDF(369.6 KB) View with Adobe Reader on a variety of devices
ePub(407.0 KB) View in various apps on iPhone, iPad, Android, Sony Reader, or Windows Phone
Mobi (Kindle)(172.9 KB) View on Kindle device or Kindle app on multiple devices
Updated:December 11, 2018
Add Logging Policies on RV180 and RV180W Routers
Security logs at the System and Kernal level includes its own logging configuration and generates messages that allow you to track down security threats and activity on a network. There are many types of information that the user can obtain from a review of various system log messages. These logs can be emailed or sent to a configured server.
The objective of this document is to explain how to configure Add Logging Policies on RV180 and RV180W.
• RV180 • RV180W
Steps of Procedure
Step 1. Use the router configuration utility to choose Administration > Logging > Logging Policies. The Logging policies page opens.
Step 2. In the Logging Policies page, click Add.
Step 3. In the Add / Edit Logging Policy Configuration page, Enter the Policy Name used for management and identification purpose.
Step 4. (Optional) Check the IPsec VPN Logs box to enable IPsec VPN logs.
Step 5. Check the box for the events that can be logged. Select from the list the level of severity that are useful for logging. For each event, select the source from which the system log be generated in. The available choices are: System, Kernel, or both.