Edimax Technology Wireless Broadband Router manual Security Log

Page 78

3.5 Security Log

View any attempts that have been made to illegally gain access to your network.

Parameters

Description

Security Log

This page shows the current security log of the

 

Broadband router. It displays any illegal attempts to

 

access your network.

 

At the bottom of the page, the security log can be

 

saved <Save> to a local file for further processing

 

or the security log can be cleared <Clear> or it can

 

be refreshed <Refresh> to get the most updated

 

situation. When the system is powered down, the

 

security log will disappear if not saved to a local file.

 

 

77

Image 78
Contents User’s Manual Page NAT Features Package ContentMinimum Requirements Local Area Network LAN ResetGet to know the Broadband Router Back Panel Wide Area Network WANFront Panel Light Status DescriptionSetup Diagram Configure your PC to obtain an IP address automaticallyGetting started DNS Configuration Select Disable DNS 2b Windows XP 2c Windows 2d Windows NT IP Address Select Obtain an IP address from a Dhcp serverPage Quick Setup Wizard Chapter General Setup ChapterSystem Tools Chapter Quick SetupStatus Info. Chapter Time ZoneBroadband Type Pptp L2TPCable Modem Fixed-IP xDSL DNSPPPoE MTU Pptp BEZEQ-ISRAEL L2TP Type in this MAC address in this section or use Turn OFF the Router When YOU Finished Using the Internet Telstra Big PondGeneral Settings WAN LANNAT SystemTime Zone Password Settings Remote Management WAN Page Static IP Address Wireless ISPDynamic IP PPPoE PPP over Ethernet8 DNS Ddns LAN LAN IPFrom network loop happened Wireless Basic SettingsSetting Essid Wlan MACAdvanced Settings Page Iapp SecurityWEP only 3.2 802.1x only 3.3 802.1x WEP Static key WPA Pre-shared keyWpatkip WPA2AESWPA Radius Access Control QoS Page Edit QoS Rule Will apply to. You can assign a single port number NAT Port Forwarding Page Virtual Server Page Example Virtual Server Special ApplicationsPage Example Special Applications ExampleUPnP Settings ALG Settings Static Routing Firewall Access Control Rule for users by IP addresses Add PC Client PC Service Example Access ControlURL Blocking DoS Denial of Service Intrusion Detection Feature4 DMZ Status Status and Information Internet Connection Primary DNS and Secondary DNS being usedDevice Status System Log Security Log Active Dhcp Client Statistics Tool Configuration Tools Restore to Factory Defaults tool to forceFirmware Upgrade Perform a reset. Your settings will not be Appendix a How to Manually find your PC’s IP and MAC address Glossary Page Snmp UCP TCP FTP Smtp POP3TCP UDP