ZyXEL Communications P-312 Manual De Usuario
P312 Broadband Security Gateway
Introducing the Prestige Web Configurator
15-7
Figure 15-5
E-Mail Log
15.4 Attack Alert
In this screen you may choose to generate an alert whenever an attack is detected. For DoS attacks, the
Prestige uses thresholds to determine when to drop sessions that do not become fully established. These
thresholds apply globally to all sessions.
Prestige uses thresholds to determine when to drop sessions that do not become fully established. These
thresholds apply globally to all sessions.
Subject:
Firewall Alert From Prestige
Date:
Fri, 07 Apr 2000 10:05:42
From:
user@zyxel.com
To:
user@zyxel.com
Firewall Alert From Prestige
Date:
Fri, 07 Apr 2000 10:05:42
From:
user@zyxel.com
To:
user@zyxel.com
1|Apr 7 00 |From:192.168.1.1 To:192.168.1.255 |default permit |forward
| 09:54:03 |UDP src port:00520 dest port:00520 |<1,00> |
2|Apr 7 00 |From:192.168.1.131 To:192.168.1.255 |default permit |forward
| 09:54:17 |UDP src port:00520 dest port:00520 |<1,00> |
3|Apr 7 00 |From:192.168.1.6 To:10.10.10.10 |match |forward
| 09:54:19 |UDP src port:03516 dest port:00053 |<1,01> |
……………………………..{snip}…………………………………..
……………………………..{snip}…………………………………..
121|Apr 7 00 |From:192.168.1.4 To:192.168.1.255 |match |forward
| 10:04:29 |UDP src port:00137 dest port:00137 |<1,02> |
122|Apr 7 00 |From:192.168.1.4 To:192.168.1.255 |match |forward
| 10:04:30 |UDP src port:00137 dest port:00137 |<1,02> |
123|Apr 7 00 |From:192.168.1.1 To:192.168.1.255 |match |forward
| 10:04:30 |UDP src port:00520 dest port:00520 |<1,02> |
124|Apr 7 00 |From:192.168.1.110 To:10.10.10.11 |match |forward
| 10:04:36 |TCP src port:01360 dest port:00023 |<1,02> |
125|Apr 7 00 |From:192.168.1.131 To:192.168.1.255 |match |forward
| 10:04:48 |UDP src port:00520 dest port:00520 |<1,02> |
126|Apr 7 00 |From:192.168.1.1 To:192.168.1.255 |match |forward
| 10:05:00 |UDP src port:00520 dest port:00520 |<1,02> |
127|Apr 7 00 |From:192.168.1.131 To:192.168.1.255 |match |forward
| 10:05:17 |UDP src port:00520 dest port:00520 |<1,02> |
128|Apr 7 00 |From:192.168.1.1 To:192.168.1.255 |match |forward
| 10:05:30 |UDP src port:00520 dest port:00520 |<1,02> |
End of Firewall Log
| 09:54:03 |UDP src port:00520 dest port:00520 |<1,00> |
2|Apr 7 00 |From:192.168.1.131 To:192.168.1.255 |default permit |forward
| 09:54:17 |UDP src port:00520 dest port:00520 |<1,00> |
3|Apr 7 00 |From:192.168.1.6 To:10.10.10.10 |match |forward
| 09:54:19 |UDP src port:03516 dest port:00053 |<1,01> |
……………………………..{snip}…………………………………..
……………………………..{snip}…………………………………..
121|Apr 7 00 |From:192.168.1.4 To:192.168.1.255 |match |forward
| 10:04:29 |UDP src port:00137 dest port:00137 |<1,02> |
122|Apr 7 00 |From:192.168.1.4 To:192.168.1.255 |match |forward
| 10:04:30 |UDP src port:00137 dest port:00137 |<1,02> |
123|Apr 7 00 |From:192.168.1.1 To:192.168.1.255 |match |forward
| 10:04:30 |UDP src port:00520 dest port:00520 |<1,02> |
124|Apr 7 00 |From:192.168.1.110 To:10.10.10.11 |match |forward
| 10:04:36 |TCP src port:01360 dest port:00023 |<1,02> |
125|Apr 7 00 |From:192.168.1.131 To:192.168.1.255 |match |forward
| 10:04:48 |UDP src port:00520 dest port:00520 |<1,02> |
126|Apr 7 00 |From:192.168.1.1 To:192.168.1.255 |match |forward
| 10:05:00 |UDP src port:00520 dest port:00520 |<1,02> |
127|Apr 7 00 |From:192.168.1.131 To:192.168.1.255 |match |forward
| 10:05:17 |UDP src port:00520 dest port:00520 |<1,02> |
128|Apr 7 00 |From:192.168.1.1 To:192.168.1.255 |match |forward
| 10:05:30 |UDP src port:00520 dest port:00520 |<1,02> |
End of Firewall Log
The date format
here is
Date-Month-Year
here is
Date-Month-Year
The date format
here is
Month-Date-Year
here is
Month-Date-Year
"End of Log"
message to show a
complete log has
been sent.
message to show a
complete log has
been sent.
You may edit the
subject title
subject title