Security Configuration
65
Data - Logs Screen
Enable Logs
Incoming Traffic
Select the desired option:
•
All IP traffic
- this will log all incoming TCP/IP connections, of
any type. This will generate the largest logs, and fill the internal
log buffer more quickly.
•
All TCP/UDP/ICMP traffic
- These 3 protocols are used by most
internet traffic. TCP is used by HTTP, FTP, Telnet, E-mail and
other common Internet protocols and applications. UDP is used by
Video streams and other communications where speed is more im-
portant than guaranteed delivery. ICMP is used by the "ping" and
"trace route" applications, and other network diagnostics.
Outgoing Traffic
Select the desired option:
•
All IP traffic
- - this will log all outgoing TCP/IP connections, of
any type. This will generate the largest logs, and fill the internal
log buffer more quickly.
•
All TCP/UDP/ICMP traffic
- These 3 protocols are used by most
internet traffic. TCP is used by HTTP, FTP, Telnet, E-mail and
other common Internet protocols and applications. UDP is used by
Video streams and other communications where speed is more im-
portant than guaranteed delivery. ICMP is used by the "ping" and
"trace route" applications, and other network diagnostics.
Because most connections are logged, the logs will still be large.
•
Selected Traffic only
- This selection will reduce the size of the
log considerably. Only HTTP connections are logged. Select the
traffic you wish to include:
•
Attempted access to blocked sites
- This will only log Web
connections which are blocked by the URL filter.
•
Websites and news groups
- This logs successful (allowed)
connections to Web Sites and newsgroup servers.
System Log
Select the desired option:
•
Router operations (start up, get time etc)
- This option will log
normal Router operations.
•
Connections to the Web - based interface of this Router
- This
option will log each connection to the Router itself, whenever the
Web-based management interface is used.
•
Other connections and traffic to this Router
- This option will
log other traffic sent to the Router itself, such as "pings" or RIP
(Router Information Protocol) packets.
•
Known DoS attacks and Port Scans
- This will log details of
DoS (Denial of Service) attacks which have been blocked by the
built-in Firewall. This Firewall uses "Stateful Inspection" technol-
ogy to block packets which are individually valid, but collectively
form an attack. Port scans, where a series of ports are checked to
see if they are open (available) are also logged.
VPN
If enabled, the VPN log will record incoming and outgoing VPN
connections.
View Log Button
Use this to view each log, as required.