Hacker Log
Whenever the firewall prevents a packet from being delivered because of a perceived security threat, the Hacker Log feature keeps track. You have the option of specifying which types of messages are logged in and displayed. Note: These options are directly related to the Protection Policy page described above.
Alert Log | Click to add any of these types of |
| |
| Spoofing, Win |
| the system log of policy violations. (To |
| view the log, go to the Advanced Setup |
| page and click System Log.) |
|
|
Log Database Properties | You have the option of selecting how often |
Log Frequency | a particular type of hacker event can occur |
| before the V3 generates a system log |
| entry. The default is every 100 records or |
| events. Available range is |
| records/events. |
|
|
General Log | Click to add General Attacks, Deny |
| Policies, or Allow Policies to the log |
| entries in the system log of policy |
| violations. (To view the log, go to the |
| Advanced Setup page and click System |
| Log.) General Attacks are those most |
| likely to |
| Attack, ICMP Redirection, and Source |
| Routing. Deny Policy and Allow Policy are |
| tied to inbound and outbound firewall |
| policies (see page 56). |
|
|
54 | Zoom V3 User’s Guide |