When Does The P-660Hn-T1A Generate The Firewall Alert; What Is The Difference Between The Log And Alert - ZyXEL Communications P-660HN-T1A Support Notes

P-660hn series 802.11n 1x1 wireless adsl2+ 4-port gateway
Hide thumbs Also See for P-660HN-T1A:
Table of Contents

Advertisement

Web configuration: Advanced Setup, Maintenance -> Logs -> Log
Settings, check Access Control and Attacks options depending on
your real situation.
CI command: sys logs category [access | attack]
(2) Enable log function in firewall default policy or in firewall rules.
After the above two steps, you can view firewall logs via
Web Configurator: Advanced setup, Maintenance -> Logs ->View
Log.
View the log by CI command: sys logs disp
You can also view Centralized logs via mail or syslog, please configure mail
server or Unix Syslog server in Web configuration: Advanced Setup,
Maintenance -> Logs -> Log Settings.

4. When does the P-660HN-T1A generate the firewall alert?

The P-660HN-T1A generates the alert when an attack is detected by the
firewall and sends it via Email. So, to send the alert, you must configure the
mail server and Email address using Web Configurator, Advanced Setup,
Maintenance -> Logs -> Log Settings. You can also specify how frequently
you want to receive the alert in it.

5. What is the difference between the log and alert?

A log entry is just added to the log inside the P-660HN-T1A and e-mailed
together with all other log entries at the scheduled time as configured. An alert
is e-mailed immediately after an attacked is detected.
All contents copyright © 2010 ZyXEL Communications Corporation.
P-660HN Series Support Notes
27

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-660hn-t1h

Table of Contents