The record of unauthorized accesses detected by Intrusion Detection System (page 88) of the
product can be sent to the specified e-mail address (Mail notification).
Internet
DOWNLOAD
POWER
STATUS
LAN 1
LAN 2
microSD
USB
LAN2
4
3
2
1
ON
STANDB
Y
CONSO
LE
LAN1
Invalid
packets
Intrusion
exploiting
security holes
Provider
Mail server
Another provider
DOWNLOAD
POWER
STATUS
LAN 1
LAN 2
microSD
USB
LAN2
4
3
2
1
ON
STANDB
Y
CONSOL
E
LAN1
Send the record of
unauthorized accesses.
Provider of the
access point
Mail server
Router
Router
Router
Mail server
Relatively safe
password flow
Risky
password flow
Risk of information
leakage
FWX120
FWX120 Operation Manual
135
Maximizing use of the product
6
Using mail notification
NOTE
• If you do not use SMTP authentication, the
password and other data are released to the
Internet without being encrypted. Please exercise
care not to do so.
For the authentication methods that the provider
supports, contact your provider.
• If your e-mail software is configured to leave
e-mails on the server, it means that new e-mails
arrive every time e-mails are checked. If you
want to know exactly whether new e-mails are on
the server, make a change to the configuration
of your e-mail software so that received e-mails
are removed from the server.