Hacker Log - Zoom X5V User Manual

Zoom telephonics x5v adsl modem user's guide
Hide thumbs Also See for X5V:
Table of Contents

Advertisement

Hacker Log

Whenever the firewall prevents a packet from being delivered
because of a perceived security threat, the Hacker Log feature
keeps track. You have the option of specifying which types of
messages are logged in and displayed. Note: These options are
directly related to the Protection Policy page described above.
Alert Log
Log Database Properties
Log Frequency
General Log
58
Click to add any of these types of
attacks—SYN Flooding, Ping of Death, IP
Spoofing, Win Nuke—to the log entries in
the system log of policy violations. (To
view the log, go to the Advanced Setup
page and click System Log. )
You have the option of selecting how often
a particular type of hacker event can occur
before the X5v generates a system log
entry. The default is every 100 records or
events. Available range is 1-65535
records/events.
Click to add General Attacks, Deny
Policies, or Allow Policies to the log
entries in the system log of policy
violations. (To view the log, go to the
Advanced Setup page and click System
Log .) General Attacks are those most
likely to occur—Land Attack, Reassembly
Attack, ICMP Redirection, and Source
Routing. Deny Policy and Allow Policy are
tied to inbound and outbound firewall
policies (see page 60).
ADSL
X5v
User's Guide

Advertisement

Table of Contents
loading

Table of Contents