User's Manual
Table Of Contents
- Introduction
- LAN Ethernet Interfaces
- Wireless Access Point (Cisco RV180W)
- Firewall and VPN Client Access
- Wireless Distribution System (Cisco RV180W)
- Virtual Networks
- Wireless Security (Cisco RV180W)
- Quality of Service (Cisco RV180W)
- Configuration and Administration
- Front Panel
- Back Panel
- Front Panel
- Back Panel
- Installation Guidelines
- Wall Mounting
- Configuring Networking
- Configuring the IPv4 WAN (Internet)
- Configuring PPPoE Profiles
- Configuring IPv4 LAN (Local Network) Settings
- Configuring Virtual LAN (VLAN) Membership
- Configuring Multiple VLAN Subnets
- Configuring Static DHCP
- Configuring Advanced DHCP Settings
- Viewing DHCP Leased Clients
- Configuring RSTP (Cisco RV180W)
- Configuring Jumbo Frames
- Choosing the Routing Mode
- Viewing Routing Information
- Configuring Static Routes
- Configuring Dynamic Routing
- Configuring the IP Mode
- Configuring IPv6 WAN Settings
- Configuring IPv6 LAN Properties
- Configuring IPv6 Routing
- Configuring Tunneling
- Configuring Router Advertisement
- Configuring the Wireless Network (Cisco RV180W)
- Wireless Security Tips
- General Network Security Guidelines
- Enabling Rogue AP Detection
- Authorizing a Rogue AP
- Adding and Editing Authorized APs
- Configuring the Firewall
- Creating an Access Rule
- Adding a Port Triggering Rule
- Adding a Port Forwarding Configuration
- Configuring One-to-One Network Address Translation (NAT)
- Configuring MAC Address Filtering
- Configuring IP/MAC Address Binding
- Creating Custom Services
- Creating Firewall Schedules
- Configuring Sessions
- Configuring Internet Group Management Protocol (IGMP)
- Configuring LAN (Local Network) Groups
- Enabling Session Initiation Protocol Application-Level Gateway (SIP ALG)
- Configuring Virtual Private Networks (VPNs) and Security
- Creating Cisco QuickVPN Client Users
- Configuring a Basic VPN
- Configuring Advanced VPN Parameters
- Configuring VPN Clients
- Monitoring VPN Tunnel Status
- Configuring VPN Users
- Configuring VPN Passthrough
- Using SSL Certificates for Authentication
- Using the Cisco RV180/RV180W With a RADIUS Server
- Configuring 802.1x Port-Based Authentication
- Configuring Quality of Service (QoS)
- Administering Your Cisco RV180/RV180W
- Configuring Web Access
- Configuring User Accounts
- Setting the Session Timeout Value
- Configuring SNMP
- Configuring Additional SNMP Information
- Configuring Logging Policies
- Configuring Firewall Logs
- Configuring Remote Logging
- Configuring Bonjour
- Configuring UPnP
- Viewing the Cisco RV180/RV180W Status
- Using Cisco QuickVPN for Windows 7, 2000, XP, or Vista
- Installing from the CD-ROM
- Downloading and Installing from the Internet
- Where to Go From Here
Administering Your Cisco RV180/RV180W
Configuring Logging
Cisco RV180/RV180W Administration Guide 139
7
DRAFT - CISCO CONFIDENTIAL
STEP 1 Choose Administration > Logging > Firewall Logs.
STEP 2 Under the type of routing logs, check the box to choose one or both of the
following for each type:
• Accepted Packets—Check this box to log packets that were successfully
transferred through the segment. This option is useful when the Default
Outbound Policy is “Block” (see Configuring the Default Outbound Policy,
page 76). For example, if Accept Packets is checked for LAN to WAN and
there is a firewall rule to allow ssh traffic from the LAN, then whenever a LAN
machine tries to make an ssh connection, those packets will be accepted
and a message will be logged. (Make sure the log option is set to allow for
this firewall rule.)
• Dropped Packets—Check this box to log packets that were blocked from
being transferred through the segment. This option is useful when the
Default Outbound Policy is “Allow” (see Configuring the Default Outbound
Policy, page 76). For example, if Dropped Packets is checked for LAN to
WAN and there is a firewall rule to block ssh traffic from LAN, then whenever
a LAN machine tries to make an ssh connection, those packets will be
dropped and a message will be logged. (Make sure the log option is set to
allow for this firewall rule.)
STEP 3 Under the type of system logs, select the type of system events to be logged. The
following system events can be recorded:
• All Unicast Traffic—Check this box to log all unicast packets directed to the
router.
• All Broadcast/Multicast Traffic—Check this box to log all broadcast or
multicast packets directed to the router.
STEP 4 Under “other events logs,” select the type of event to be logged. The following
events can be recorded:
• Source MAC Filter—Check this box to log packets matched due to source
MAC filtering. Uncheck this box to disable source MAC filtering logs.
• Bandwidth Limit—Check this box to log packets dropped due to Bandwidth
Limiting.
STEP 5 Click Save.