Network Configuration (Intrusion Detector)

To enable intrusion detector, choose Enable or Enable (Apply packet filter rules) from the Intrusion Detector drop-down box. If packet filter rules are applied, packets will be filtered with packet filter rules before Intrusion Detector is applied.

Blocking IP spoofing blocks packets from devices using an IP address that is not their own.

In the Threshold Value box, enter the number of times an event has to occur before you receive notification.

To configure your email alerts, enter your email address and mail server information. You may make up a sender email address,

such as “alert@router.com”. Alert emails will appear to come from this address.

Intrusion detector also blocks unauthorized access attempts and suspicious traffic from WAN-side devices (the internet).

38

Page 38
Image 38
Buffalo Technology WHR-G54S user manual Network Configuration Intrusion Detector