Edimax Technology Wireless VPN Broadband Router user manual Security Log

Page 79

3.5 Security Log

View any attempts that have been made to illegally gain access to your network.

Parameters

Description

Security Log

This page shows the current security log of the

 

Broadband router. It displays any illegal attempts to

 

access your network.

 

At the bottom of the page, the security log can be

 

saved <Save> to a local file for further processing

 

or the security log can be cleared <Clear> or it can

 

be refreshed <Refresh> to get the most updated

 

situation. When the system is powered down, the

 

security log will disappear if not saved to a local file.

 

 

78

Image 79
Contents User’s Manual Page NAT Package Content FeaturesMinimum Requirements Wide Area Network WAN ResetGet to know the Broadband Router Back Panel Local Area Network LANLight Status Description Front PanelConfigure your PC to obtain an IP address automatically Setup DiagramGetting started DNS Configuration Select Disable DNS 2b Windows XP 2c Windows IP Address Select Obtain an IP address from a Dhcp server 2d Windows NTPage General Setup Chapter Quick Setup Wizard ChapterTime Zone Quick SetupStatus Info. Chapter System Tools ChapterBroadband Type L2TP PptpCable Modem DNS Fixed-IP xDSLPPPoE MTU Pptp BEZEQ-ISRAEL L2TP Type in this MAC address in this section or use Telstra Big Pond Turn OFF the Router When YOU Finished Using the InternetGeneral Settings LAN WANSystem NATTime Zone Password Settings Remote Management WAN Page PPPoE PPP over Ethernet Wireless ISPDynamic IP Static IP AddressPage Ddns LAN IP LANWireless Setting Basic SettingsWlan MAC EssidAdvanced Settings Page Security IappWEP only 3.2 802.1x only WPA Pre-shared key 3.3 802.1x WEP Static keyWPA2AES WpatkipWPA Radius Access Control QoS Page Edit QoS Rule Will apply to. You can assign a single port number NAT Port Forwarding Page Virtual Server Page Special Applications Example Virtual ServerPage Example Example Special ApplicationsUPnP Settings ALG Settings Static Routing Firewall Access Control Rule for users by IP addresses Add PC Example Access Control Client PC ServiceURL Blocking Intrusion Detection Feature DoS Denial of Service4 DMZ VPN Status Status and Information Primary DNS and Secondary DNS being used Internet ConnectionDevice Status System Log Security Log Active Dhcp Client Statistics Tool Restore to Factory Defaults tool to force Configuration ToolsFirmware Upgrade Perform a reset. Your settings will not be Appendix a How to Manually find your PC’s IP and MAC address Glossary Page UDP TCP FTP Smtp POP3TCP Snmp UCP