![background image](http://html1.mh-extra.com/html/3com/officeconnect-3c16771/officeconnect-3c16771_user-manual_3100790085.webp)
Logs and Alerts
85
appears in the packet are shown. In these attacks, the
source address shown is usually fake and usually cannot
be used to determine the source of the attack.
Varying conditions on the Internet can produce conditions
which may cause the appearance of an attack, even when
no-one is deliberately attacking one of the machines on the
LAN or DMZ. This is particularly true for SYN Flood attacks.
If the log message calls the attack ”possible”, or it only
happens on an irregular basis, then there is probably no
attack in progress. If the log message calls the attack
”probable”, contact the ISP to see if they can track down
the source of the attack. In either case, the LAN and DMZ
are protected and you do not need to take further steps.
Log/Alert Settings
Click
Log
and then select the
Log Settings
tab. A window
similar to that in
Figure 34
is displayed. Alternatively select
Log/Alert Settings
from the Home screen graphic
.
Figure 34
Log Settings Window
Summary of Contents for OfficeConnect 3C16771
Page 8: ......
Page 16: ...16 ABOUT THIS GUIDE...
Page 34: ...34 CHAPTER 2 INSTALLING THE HARDWARE...
Page 126: ...126 CHAPTER 5 THE OFFICECONNECT WEB SITE FILTER ACTIVATION...
Page 132: ...132 APPENDIX A CABLE SPECIFICATIONS AND PINOUT DIAGRAM Figure 52 Twisted Pair Pinouts...
Page 158: ...158 APPENDIX E EXAMPLE CONFIGURATIONS...
Page 172: ......
Page 178: ...178 INDEX...