Changing Log and Alert Settings
85
When log overflows
In some cases, the log buffer may fill up, which can happen if there is a
problem with the mail server and the log cannot be successfully e-mailed.
By default the Firewall overwrites the log and discards its contents. As a
security measure, you can choose to shut down the Firewall, which
prevents any further traffic from traveling through without being logged.
To do this select
Shutdown Firewall
.
Selecting the
Categories to Log
Click the appropriate check box to enable or disable the generation of
the following log message categories.
System Maintenance
When enabled, log messages showing general system maintenance
activity, such as administrator logins, automatic loading of Web Site
Filters, activation and restarting the Firewall, are generated. This is
enabled by default.
System Errors
When enabled, log messages showing problems with DNS, e-mail, and
automatic Web Site Filter loading are generated. This is enabled by
default.
Blocked Web Sites
When enabled, log messages showing Web sites, newsgroups, or other
services blocked by the Web Site Filter, by keyword, or for any other
reason are generated. This is enabled by default.
Blocked Java, ActiveX, and Cookies
When enabled, log messages showing Java, ActiveX, and Cookies which
are blocked by the Firewall are generated. This is enabled by default.
User Activity
When enabled, log messages showing any successful or unsuccessful user
logins will be generated. This is enabled by default.
DUA1611-0AAA02.book Page 85 Thursday, August 2, 2001 4:01 PM
Содержание SUPERSTACK 3CR16110-95
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM...