Status - Log; Status - Log - Intrusion Log - D-Link DRO-250i User Manual

Hide thumbs Also See for DRO-250i:
Table of Contents

Advertisement

Configuring DRO-250i
3.8.6 Status
Log
-

3.8.6.1 Status - Log - Intrusion Log

Click on Status > Status Log > Intrusion Log to open the web page as
shown below:
Certain sessions between computers on LAN and the WAN have the
potential to cause a disruption in the function of computers and are
blocked by the Router firewall. Some of these session types are pre-
defined by the factory, and are commonly used intrusion methods. Events
blocked (attempts to connect to computers on LAN, between computers
on LAN, or between computers on LAN and the WAN) because they meet
the criteria pre-defined at the factory as being a commonly used intrusion
method, are recorded here, in the Intrusion Detection Log.
Intrusion Time - This is the time of intrusion. It will be helpful for the
user to know the details about the time when intrusion happened.
Intrusion Type - A brief statement of the type of intrusion that was
attempted is displayed here. The Router firewall can detect following
DRO-250i User Manual
118

Advertisement

Table of Contents
loading

Table of Contents