![TRENDnet TW100-BRV304 SHEETS Скачать руководство пользователя страница 69](http://html1.mh-extra.com/html/trendnet/tw100-brv304-sheets/tw100-brv304-sheets_user-manual_1157294069.webp)
Security Configuration
Logs
The Logs record various types of activity on the TW100-BRV304. This data is useful for
troubleshooting, but enabling all logs will generate a large amount of data and adversely affect
performance.
Since only a limited amount of log data can be stored in the TW100-BRV304, log data can
also be E-mailed to your PC or sent to a Syslog Server.
Figure 40: Logs Screen
Data - Logs Screen
Enable Logs
Incoming Traffic
Select the desired option:
•
All IP traffic
- this will log all incoming TCP/IP connections, of
any type. This will generate the largest logs, and fill the internal
log buffer more quickly.
•
All TCP/UDP/ICMP traffic
- These 3 protocols are used by most
internet traffic. TCP is used by HTTP, FTP, Telnet, E-mail and
other common Internet protocols and applications. UDP is used by
Video streams and other communications where speed is more im-
portant than guaranteed delivery. ICMP is used by the "ping" and
"trace route" applications, and other network diagnostics.
65
Содержание TW100-BRV304 SHEETS
Страница 1: ......
Страница 2: ......
Страница 27: ...PC Configuration Figure 15 Windows NT4 0 DNS 23...
Страница 63: ...Security Configuration 59...
Страница 149: ...Appendix B Specifications 145...