Wireless-G VPN Broadband Router
Log Time Threshold. You can designate how often the log will be
The Router will
Alert Log
You can receive alert logs for specific types of Internet attacks and events: Syn Flooding, IP Spoofing, Win Nuke,
Ping of Death, and Unauthorized Login Attempt. To be notified of a specific event, click its checkbox.
General Log
Select the type of activity you would like to log. Select System Error Messages, Deny Policies, Allow Policies,
Content Filtering, Data Inspection, Authorized Login, or Configuration Changes.
When you have finished making changes on this screen, click the Save Settings button to save the changes, or click the Cancel Changes button to undo your changes. For help information, click More.
Chapter 6: Configuring the | 48 |
The Administration Tab - Log