
Configuring DRO-250i
DRO-250i User Manual
118
3.8.6 Status
-
Log
3.8.6.1 Status - Log - Intrusion Log
Click on
Status
>
Status Log >
Intrusion Log
to open the web page as
shown below:
Certain sessions between computers on LAN and the WAN have the
potential to cause a disruption in the function of computers and are
blocked by the Router firewall. Some of these session types are pre-
defined by the factory, and are commonly used intrusion methods. Events
blocked (attempts to connect to computers on LAN, between computers
on LAN, or between computers on LAN and the WAN) because they meet
the criteria pre-defined at the factory as being a commonly used intrusion
method, are recorded here, in the
Intrusion Detection Log
.
Intrusion Time
- This is the time of intrusion. It will be helpful for the
user to know the details about the time when intrusion happened.
Intrusion Type
- A brief statement of the type of intrusion that was
attempted is displayed here. The Router firewall can detect following