Hacker Log - Zoom Gateway/Router V3 User Manual

Zoom telephonics zoom v3 gateway/router user guide
Hide thumbs Also See for Gateway/Router Zoom V3:
Table of Contents

Advertisement

Hacker Log

Whenever the firewall prevents a packet from being delivered
because of a perceived security threat, the Hacker Log feature
keeps track. You have the option of specifying which types of
messages are logged in and displayed. Note: These options are
directly related to the Protection Policy page described above.
Alert Log
Log Database Properties
Log Frequency
General Log
54
Click to add any of these types of
attacks—SYN Flooding, Ping of Death, IP
Spoofing, Win Nuke—to the log entries in
the system log of policy violations. (To
view the log, go to the Advanced Setup
page and click System Log. )
You have the option of selecting how often
a particular type of hacker event can occur
before the V3 generates a system log
entry. The default is every 100 records or
events. Available range is 1-65535
records/events.
Click to add General Attacks, Deny
Policies, or Allow Policies to the log
entries in the system log of policy
violations. (To view the log, go to the
Advanced Setup page and click System
Log .) General Attacks are those most
likely to occur—Land Attack, Reassembly
Attack, ICMP Redirection, and Source
Routing. Deny Policy and Allow Policy are
tied to inbound and outbound firewall
policies (see page 56).
Zoom V3 User's Guide

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the Gateway/Router Zoom V3 and is the answer not in the manual?

Questions and answers

Table of Contents