Firewall
Dlink DRO-210i User Guide 48
7.2.2 Intrusion Log
When traffic matches an Intrusion si gnature and is blocked by the IDS engine, the
blocking event is recorded in the Intrusion Detection Log.
Select Status
Log Tables
Intrusion Log to view the Intrusion Log Table as
explained below.
Intrusion Log Table
Intrusion Time Displays the time when the intrusion happened.
Intrusion Type Displays a brief statement of the type of intrusion that was attempted.
The router’s firewall can detect following attacks - SYN Flooding , TCP
Hijacking, LAND Attack, WinNuke/OOBNuke, Christmas Tree SYN /
FIN (Jackal), SYN / FIN (zero-sized DNS zone payload), BackOffice,
NetBus, Smurf, Tear Drop, ICMP Flooding.
Source: port Displays the source IP address and the TCP/UDP port that the intrusion
was attempted from.
Destination: port Displays the destination IP address and the TCP/UDP port that t he
intrusion was attempted to.
7.2.3 Black List
This list shows the blacklist of intruders in the "Intruder Blacklist" which are
automatically blocked as soon as they are detected.
Select Status
Log Tables
Black List to view the Black List Table as explained
below.
Black List Table
Source IP Displays the source IP address that was blacklisted.
Destination IP Displays the destination IP that was blacklisted.
Destination
Port/Transport Type
Displays the destination port and transport type of the blacklisted packet.
Blocking Duration Displays the time of blocking in seconds.
Press Delete button for unblock the corresponding entry.
Web UI
Web UI