Edimax Technology BR-6204WG manual Security Log

Page 84

3.5 Security Log

View any attempts that have been made to illegally gain access to your network.

Parameters

Description

Security Log

This page shows the current security log of the

 

Broadband router. It displays any illegal attempts to

 

access your network.

 

At the bottom of the page, the security log can be

 

saved <Save> to a local file for further processing

 

or the security log can be cleared <Clear> or it can

 

be refreshed <Refresh> to get the most updated

 

situation. When the system is powered down, the

 

security log will disappear if not saved to a local file.

 

 

83

Image 84
Contents Page Linux Open Source Code Installation FCC Caution Safety Page NAT Features Package ContentMinimum Requirements Reset Get to know the Broadband Router Back PanelLocal Area Network LAN Wide Area Network WANFront Panel Light Status DescriptionSetup Diagram Configure your PC to obtain an IP address automaticallyGetting started DNS Configuration Select Disable DNS 2a Windows 95/98/Me2b Windows XP 2c Windows 2d Windows NT IP Address Select Obtain an IP address from a Dhcp serverPage Quick Setup Wizard Chapter General Setup ChapterStatus Info. Chapter System Tools ChapterQuick Setup Time ZoneBroadband Type Pptp L2TPCable Modem Fixed-IP xDSL DNSPPPoE MTUPptp Page BEZEQ-ISRAEL L2TP This is optional. You can specify the maximum size Turn OFF the Router When YOU Finished Using the Internet Telstra Big PondGeneral Settings WAN LANNAT System Settings SystemTime Zone Password Settings Remote Management WAN Wireless ISP Page Page Dynamic IP Static IP AddressPPPoE PPP over Ethernet 6 L2TP8 DNS Ddns LAN LAN IPFrom network loop happened Wireless Basic SettingsSetting Essid Wlan MACAdvanced Settings Page Iapp SecurityWEP only 3.2 802.1x only 3.3 802.1x WEP Static key WPA Pre-shared keyWpatkip WPA2AESWPA Radius Access Control QoS Page Edit QoS Rule Will apply to. You can assign a single port number NAT Port Forwarding Page Virtual Server Page Example Virtual Server Special ApplicationsPage Example Special Applications ExampleUPnP Settings ALG Settings Static Routing Firewall Access Control Rule for users by IP addresses Add PC Client PC Service Example Access ControlURL Blocking DoS Denial of Service Intrusion Detection Feature4 DMZ Status Status and Information Internet Connection Primary DNS and Secondary DNS being usedDevice Status System Log Security Log Active Dhcp Client Statistics Tool Configuration Tools Restore to Factory Defaults tool to forceFirmware Upgrade Perform a reset. Your settings will not be Appendix a How to Manually find your PC’s IP and MAC address Glossary Page TCP FTP Smtp POP3 TCPSnmp UCP UDP