When Does The P-660Hw-Tx V3 Generate The Firewall Alert; What Is The Difference Between The Log And Alert - ZyXEL Communications P-660HW-Tx v3 Support Notes

802.11g wireless adsl2+ 4-port gateway
Hide thumbs Also See for P-660HW-Tx v3:
Table of Contents

Advertisement

(1) Enable log function in Centralized logs setup via either one of the following
methods,
Web configuration: Advanced Setup, Maintenance -> Logs -> Log
Settings, check Access Control and Attacks options depending on
your real situation.
CI command: sys logs category [access | attack]
(2) Enable log function in firewall default policy or in firewall rules.
After the above two steps, you can view firewall logs via
Web Configurator: Advanced setup, Maintenance -> Logs ->View
Log.
View the log by CI command: sys logs disp
You can also view Centralized logs via mail or syslog, please configure mail
server or Unix Syslog server in Web configuration: Advanced Setup,
Maintenance -> Logs -> Log Settings.

4. When does the P-660HW-Tx v3 generate the firewall alert?

The P-660HW-Tx v3 generates the alert when an attack is detected by the
firewall and sends it via Email. So, to send the alert, you must configure the
mail server and Email address using Web Configurator, Advanced Setup,
Maintenance -> Logs -> Log Settings. You can also specify how frequently
you want to receive the alert in it.

5. What is the difference between the log and alert?

A log entry is just added to the log inside the P-660HW-Tx v3 and e-mailed
together with all other log entries at the scheduled time as configured. An alert
is e-mailed immediately after an attacked is detected.
All contents copyright © 2008 ZyXEL Communications Corporation.
P-660HW-Tx v3 Series Support Notes
27

Advertisement

Table of Contents
loading

Table of Contents