Multi-Tech Systems RF660 User Manual

Page of 189
Chapter 6 – RouteFinder Software  
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 
126 
Statistics & Logs > Port Scan Logs 
Statistics & Logs > View Logs 
Statistics & Logs
 > 
Port Scans 
 
The Port Scans screen displays the information gathered by the Network Intrusion Detection module, which guarantees the 
integrity of the system by watching and logging stealth port scans and suspicious packets. The system administrator will 
receive emails every hour if such packets are received.  
You can setup User Defined Intrusion Detection rules on the Administration > Intrusion Detection screen.  
Note:
 Apart from the use defined rules, the intrusion detection module will log port scans detected, but the destination 
address and port will not be displayed for these packets. Instead, the number of port scan attempts will be displayed. 
 
Intrusion Detection Live Log 
Click the Intrusion Detection Live Log button to display the User Defined Intrusion Detection rules entered 
on the Administration > Intrusion Detection screen.  
Portscan Live Log 
Click the Portscan Live Log button to display detected port scans. The source address, the destination 
address, protocol, source port, and destination port of these packets will be displayed. 
 
 
Statistics & Logs
 > V
iew Logs
 
Various log files maintained by the RouteFinder can be viewed and downloaded to the browser from this screen.  
The other log file screens provide real-time view. This screen provides you with access to log files from previous dates. Logs 
available for viewing are Kernel Log, Daemon Log, HTTP Proxy Access, Network Intrusion Alert, IPSec, Self Monitor, URL 
Filtering, Mail Reply, PPP, PPTP, PPPoE, and SPAM Log. 
 
Logs Display - Select a Date and Select a Log File 
1.
  First, select the date of the log file, and then select the type of log file. 
2.
  Click the Continue button.  
3
.  Another screen displays. On this screen, select the time and action to be taken. Actions may be: 
• 
Display the file 
• 
Search for a pattern in the file 
• 
Download the file
 
4
. Click 
Go.