ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Firewall Protection
5-43
v1.0, September 2009
3.
Enter the settings as explained in
Table 5-9
.
Figure 5-27
Table 5-9. IP/MAC Binding Settings
Setting
Description (or Subfield and Description)
Email IP/MAC Violations
Do you want to
enable E-mail
Logs for IP/MAC
Binding Violation?
Select one of the following radio buttons:
•
Yes.
IP/MAC binding violations are e-mailed.
•
No
. IP/MAC binding violations are not e-mailed.
Note
: Click the
Firewall Logs & E-mail page
hyperlink to ensure that e-mailing of
logs is enabled on the Email and Syslog screen (see
“Configuring Logging, Alerts,
and Event Notifications” on page 11-5
).
IP/MAC Bindings
Name
A descriptive name of the binding for identification and management purposes.
MAC Address
The MAC address of the PC or device that is bound to the IP address.