11Mbps Wireless Internet Broadband Router

Figure 3-20 System Log

3.4.2 Hacker Log

You can detect the intrusion from this screen. This screen shows the information of the unauthorized access request to your network. See Figure 3-21 Hacker Log Menu Screen.

Figure 3-21Hacker Log Menu Screen

31

Page 32
Image 32
Xerox 2314 manual Hacker Log, System Log