Gigabit Content Security Router User’s Manual
Item
Description
Enabled
If this option is selected, the System Log feature will be enabled.
Syslog Server
The device provides external system log servers with log collection feature.
System log is an industrial standard communications protocol. It is designed to
dynamically capture related system message from the network. The system log
provides the source and the destination IP addresses during the connection,
service number, and type. To apply this feature, enter the system log server
name or the IP address into the empty "system log server" field.
Log Setting
Alert Log
The device provides the following warning message. Click to activate these features: Syn Flooding, IP
Spoofing, Win Nuke, Ping of Death / Unauthorized Login Attempt.
Item
Description
Syn Flooding
Bulky syn packet transmission in a short time causes the overload of the system
storage of record in connection information.
IP Spoofing
Through the packet sniffing, hackers intercept data transmitted on the network.
After they access the information, the IP address from the sender is changed so
that they can access the resource in the source system.
Win Nuke
Servers are attacked or trapped by the Trojan program.
Ping of Death
The system fails because the sent data exceeds the maximum packet that can be
handled by the IP protocol.
Unauthorized Login
If intruders into the device are identified, the message will be sent to the system
log.
- 128 -
Содержание CS-5800
Страница 1: ...Gigabit Content Security Router User s Manual User s Manual CS 5800 Gigabit Content Security Router...
Страница 64: ...Gigabit Content Security Router User s Manual 58...
Страница 75: ...Gigabit Content Security Router User s Manual IP MAC Binding 69...
Страница 117: ...Gigabit Content Security Router User s Manual 111...
Страница 118: ...Gigabit Content Security Router User s Manual 112...
Страница 140: ...Gigabit Content Security Router User s Manual destination port bytes per second and percentage 134...