background image

62 

Web User Interface 

 

6.6.2  Event Log 

This page allows configuration of Firewall event log reporting via email alerts and a local 

view of the attacks on the system. 

 

Label Description 

Contact E-mail Address 

Enter E-mail address for sending Firewall event log. 

Email Address Password  The password of the E-mail you enter 

SMTP Server Name 

Enter SMTP Server Name for sending Firewall event log. 

E-mail Alerts 

If you enable ,the alert can appearance when have a new 

mail 

 

Apply 

Click to submit changes. 

Description 

Summary of this firewall event log. 

Count 

If a certain firewall event log repeated for several times, 
value in count will increase. 

Last Occurrence 

Display the time when the last of the firewall event 
occurred. 

Target 

Display the destination IP address of this access event. 

Source 

Display the source IP address of this access event. 

E-mail log 

Click to send current Firewall event log to e-mail address 

 

Содержание DDW2600

Страница 1: ...DDW2600 DDC2700 End User Guide 2 11 2009 Version 1 2 User s Guide...

Страница 2: ...e that admin account owns 1 IP mapping 2 Wireless advanced 3 Wireless Bridging 4 Wireless WiFi Multi Media 5 Tools Port configuration 6 Tools UI Authentication Tools Operation Mode 1 1 2008 08 04 John...

Страница 3: ...pstream Burst 14 6 1 6 Operation Configuration 15 6 1 7 Event Log 16 6 2 Gateway 17 6 2 1 Information 18 6 2 2 Basic Setup 19 6 2 3 DHCP 21 6 2 4 DHCP static Lease 22 6 2 5 DDNS 23 6 2 6 Time 24 6 2 7...

Страница 4: ...4 VPN L2TP PPTP 50 6 4 5 VPN Event Log 52 6 5 Parental Control 52 6 5 1 User Setup 52 6 5 2 Activation 55 6 5 3 TOD Filter 56 6 5 4 Event Log 58 6 6 Firewall 59 6 6 1 Content Filter 60 6 6 2 Event Log...

Страница 5: ...tion Understand the Wireless Cable Modem s Features Your wireless cable modem has the following features to help you access and use the Internet Wireless connectivity means that you can use your PC ju...

Страница 6: ...ted within proper distance of your wireless cable modem and computer Be sure not to bend the cable as this may strain the connector and cause damage 2 Place wireless cable modem as high as possible Al...

Страница 7: ...able connector Connect the other end of the coaxial cable to the cable wall outlet Be sure not to bend or over tighten the cables as this may strain the connector and cause damage If you plan to conne...

Страница 8: ...sing the Ethernet port Using the Ethernet port allows to you connect multiple computers to a wireless cable modem through the use of additional equipment which is not included Please contact your cabl...

Страница 9: ...If the pwr sync ready and ethernet LEDs are solidly lit the wireless cable modem is working properly Troubleshooting the Ethernet Installation None of the LEDs are on when I power on the Wireless LAN...

Страница 10: ...connection with the wireless cable modem Power cycle the wireless cable modem by removing the power adapter from the electrical outlet and plugging it back in Wait several minutes for the wireless ca...

Страница 11: ...nal power on tests usb Indicates connectivity between the USB port on the wireless cable modem and a PC s USB port sync Indicates the connection status between the wireless cable modem and the cable n...

Страница 12: ...th the wireless cable modem Ethernet 10 100 Port 1 2 3 4 This is where you plug the Ethernet cable The other end connects to the Ethernet port on the PC or NIC USB Port This is where you plug the incl...

Страница 13: ...nd or password the web user interface displays 401 Unauthorized User Name user Password user only can access to MODEM GATEWAY WIRELESS VPN PARENTAL CONTROL FIREWALL and TOOLS Web User Interface Home P...

Страница 14: ...Configure Area Below chapter is to go through page by page to ensure that you re clear about each feature and how to use it 6 1 MODEM User can select different options to view wireless cable modem s...

Страница 15: ...number of a product Boot Code Version Software version of device driver Software version Software Hardware Version An internal ID number to identify hardware design CA Key This is required by BPI Cab...

Страница 16: ...gress Connectivity State After physical layer s initialization cable modem will be configured by a DHCP server Once succeeds to get an IP that means cable modem is online In status column it shows the...

Страница 17: ...equired for the downstream channel locked by cable modem This is decided by service provider Downstream Symbol Rate Display the symbol rate Current cable modem downstream symbol rate QAM64 is 5056941...

Страница 18: ...Current cable modem upstream frequency Hz Upstream Modulation Current cable modem upstream modulation type QPSK QAM8 QAM16 QAM32 QAM64 QAM128 QAM256 Upstream Symbol Rate Current cable modem upstream s...

Страница 19: ...of codeword parity bytes is 2 T FEC Codeword Information Bytes k Fixed 16 to 253 assuming FEC on Shortened 16 to 253 assuming FEC on Scrambler Seed 15 bits Not used if scrambler is off Maximum Burst...

Страница 20: ...aximum Downstream Data Rate Display the maximum downstream data rate Maximum Upstream Data Rate Display Maximum Upstream Data Rate Maximum Upstream Channel Burst Display Maximum Upstream Channel Burst...

Страница 21: ...example you can see configuration file CVC validation Failure this indicates that cable modem failed to validate the CONFIG file downloaded from MSO s TFTP server maybe caused by error root key Furth...

Страница 22: ...s of Residential Gateway Internet IP Address Display the Internet IP address Subnet Mask Display the subnet mask of the Internet IP address Default Gateway Display the default gateway IP address DNS D...

Страница 23: ...eless feature Operating Mode Display what mode the router is working on Private IP Range Display the private IP address assigned to DHCP client Public IP DHCP Server Range Display the Public IP DHCP S...

Страница 24: ...IP address Renew WAN Lease Click to renew the WAN IP address Refresh Click to refresh the status of this page WAN Connection Type Select to define the WAN connection type DHCP determine the WAN interf...

Страница 25: ...Starting Address Define the starting private IP address Public Starting Address Define the starting public IP address Number of CPEs Define the maximum number of CPEs Lease Time Define the DHCP lease...

Страница 26: ...reserve the current private IP address to be assigned to this host statically That means 192 168 0 10 will be reserved to host 001c2351abd4 Force available Click to active this rule 6 2 4 DHCP static...

Страница 27: ...ion DDNS Service Select the type of service that you are registered for from your Dynamic DNS service provider www DyDNS org www no ip com UserName Input your DDNS account username subscribed to the s...

Страница 28: ...iption Enable SNTP Click to enable SNTP feature Current Time Display the system time currently System Start Time Display the accumulated time since system was started Time Server 1 Define the Time ser...

Страница 29: ...the IPSec request to local host PPTP PassThrough If Internet user initialized PPTP VPN request to the host located behind the router NAT will make this attempt fail Enable Pass Through is to force the...

Страница 30: ...u can regard this as black list any host that its MAC address is among this MAC list will not be able to access Internet through the router Label Description Index Index number of the rule MAC Address...

Страница 31: ...vices on the LAN Label Description Start Address Fill in with start address End Address Fill in with end address Enabled Select to active the rule Apply Click to save 6 2 10 Advanced Port Filtering Th...

Страница 32: ...ort Protocol Define the protocol type Enabled Select to active the rule Apply Click to save 6 2 11Advanced Forwarding This page allows for incoming requests on specific port numbers to reach web serve...

Страница 33: ...nterface IP Input the public IP address Ext Start Port Define the port that published to Internet Start port Ext End Port Define the port that published to Internet End port Protocol Define the protoc...

Страница 34: ...s on the LAN This allows for special applications that require specific port numbers with bi directional traffic to function properly Applications such as video conferencing voice gaming and some mess...

Страница 35: ...computer IP address Ubee wireless router associates John s computer IP address with the target port range of 6970 7170 3 The Real Audio server responds to a port number ranging between 6970 7170 4 Ube...

Страница 36: ...nge of ports that a server on the WAN uses when it response to service requests The router forwards the traffic with this port or range of ports to the client computer on the LAN that requested the se...

Страница 37: ...ss Clear Select to delete this rule Apply Click to save 6 2 14 Advanced DMZ Host Exposed Host This page allows configuration of a specific network device to be exposed or visible directly to the WAN p...

Страница 38: ...less LAN adapters communicating through access points which bridge network traffic to the wired LAN Note DDC2700 doesn t support wireless Label Description Wireless MAC Address Display MAC address of...

Страница 39: ...your particular region Select a channel from the drop down list box Interface When set to enabled wireless clients can access to the network Apply Click to save Restore Wireless Defaults Click to res...

Страница 40: ...ss gateway and wireless client As long as the passwords match a client will be granted access to a WLAN WPA WPA2 Encryption Switch to enable and disable WPA WPA2 encryption WPA Pre Shared Key The encr...

Страница 41: ...h devices 802 1x Authentication Enable to user 802 1x to do authenticate wireless client Network Key 1 You can pre define up to 4 keys for 64 bit or 128 bit 64 bit keys require 10 hexadecimal digits 1...

Страница 42: ...ed device tries to connect to this wireless router user has to input its PIN into current WPS configure page s STA PIN filed Apply Click to make WPS configurations to take effect WPS Method Select WPS...

Страница 43: ...list of the wireless client their MAC address should be inputted here manually MAC Addresses Input the MAC address Apply Click to save Connected Clients List of current connected Wireless client MAC A...

Страница 44: ...ltaneously You can then assign varying levels of privilege to different SSIDs and networks associated Wireless stations can use different SSIDs to associate with the same AP A maximum of four BSSs are...

Страница 45: ...is hidden SSID name unless user manually add this SSID Guest LAN Settings DHCP Server Allow user to deploy DHCP server for this guest SSID IP Address This IP address will be the default gateway addres...

Страница 46: ...communications through the public Internet but a VPN need not have explicit security features such as authentication or content encryption VPNs for example can be used to separate the traffic of diffe...

Страница 47: ...net protocol Security IPSec is a standard based VPN that offers flexible solutions for secure data communications across a public network like the Internet IPSec is built around a number of standardiz...

Страница 48: ...ity is not required or not sanctioned by government encryption restrictions an AH can be employed to ensure integrity This type of implementation does not protect the information from dissemination bu...

Страница 49: ...45 Web User Interface Label Description Tunnel Select the specific VPN tunnel to configure DDW2600 DDC2700...

Страница 50: ...his wireless router by WAN IP address IP address FQDN Email address In Aggressive mode VPN concentrator uses to identify incoming SAs by ID type and content since this identifying information is not e...

Страница 51: ...VPN Gateway you can select IP address usually suitable for static public IP address Fully Qualified Domain Name FQDN usually suitable for dynamic public IP address Remote address Input IP address val...

Страница 52: ...applies a 128 bit key to 128 bit blocks of data AES is faster than 3DES Here you can have the choice AES 128 AES 192 AES 256 Phase 1 authentication Select which hash algorithm to use to authenticate...

Страница 53: ...ices are Null SHA1 and MD5 SHA1 is generally considered stronger than MD5 but it is also slower Phase 2 SA lifetime Define the length of time before an IPSec SA automatically renegotiates in this fiel...

Страница 54: ...ers on the remote network and vice versa Select this check box to send NetBIOS packets through the VPN connection Dead peer detection Force wireless router to detect if the remote IPSec gateway is ava...

Страница 55: ...cryption Select to enable MPPE Encryption It uses the RSA RC4 encryption algorithm Apply Click to save Users Username Manually input the L2TP PPTP username Password Manually input the L2TP PPTP passwo...

Страница 56: ...sit only the sites specified in the Allowed Domain List of his her content rule The Parental Control User Setup Page is the master page to which each individual user is linked to a specified time acce...

Страница 57: ...ng the user to re login at expiration to continue using the Internet These timed logins insure that a specific user is using the Internet gateway for access and logging access can be provided appropri...

Страница 58: ...le this privilege after expiration Content Rule Select an existing content rule that defines what kind of website he can visit and what can t be visited White List Access Only Suppose admin has create...

Страница 59: ...b sites When you change your Parental Control settings you must click on the appropriate Apply Add or Remove button for your new settings to take effect If you refresh your browser s display you will...

Страница 60: ...to delete an existing keyword Blocked Domain List Domain list that s to be blocked Add Domain Click to add a new domain Remove Domain Click to delete an existing domain Allowed Domain List White list...

Страница 61: ...a selected rule Enable Select the checkbox to active this time policy rule unselect the checkbox to disable this rule Remove Click to delete a selected rule Days to Block Select the day that this time...

Страница 62: ...rrence Display the time when the last event occurred Action Display what s done by parental control drop or permit an access request Target Display the destination IP address of a certain access reque...

Страница 63: ...olicy between two networks It may also be defined as a mechanism used to protect a trusted network from an untrusted network Of course firewalls cannot solve all of the security problems A firewall is...

Страница 64: ...mended that the Firewall is left enabled at all times for protection against Denial of Service attacks Go to the Parental Control page to block internet access to specific sites Label Description Cont...

Страница 65: ...Enable firewall function Protection against incoming connection requests on routed subnet Enable firewall to protect all of the routed subnet connected to the wireless router Apply Click to save the...

Страница 66: ...Name for sending Firewall event log E mail Alerts If you enable the alert can appearance when have a new mail Apply Click to submit changes Description Summary of this firewall event log Count If a c...

Страница 67: ...all Blocked Connections Select to record all of the access attempts that are blocked by firewall Known Internet Attacks Record event log for known attacks from Internet Product Configuration Events Re...

Страница 68: ...of the batch ping operation Ping Interval Define the interval between 2 ping operations Start Test Click to start test Abort Test Click to stop test Clear Results Click to clear existing testing resu...

Страница 69: ...me out Define the expiration time for this tracert operation Start Test Click to start tracert test Abort Test Click to stop test Clear Results Click to clear existing testing result Results This area...

Страница 70: ...face Display the method via which the DHCP client is connected to wireless router Refresh Click to refresh the client list 6 7 4 Frequency Scanning Plan Label Description Lowest Center Frequency Displ...

Страница 71: ...ccount that has limited privilege here to modify username for this account New Password Input the value of new password Confirm Password Double confirm with the new password 6 7 6 User Defaults This p...

Страница 72: ...68 Reset The system Select to do a power cycle reboot...

Страница 73: ...DDW2600 DDC2700...

Отзывы: