CyberTAN Technology Inc. WR214C Manuel D’Utilisation

Page de 67
Broadband Security Router User Guide
 
 
- 45 - 
 
Access Log: 
Check the “Enable” option if you want to activate this 
function. 
Send Log To: 
Enter the IP address of the PC that you wish to use to view 
the Log information. 
View Log: 
Click this button to view the log on-line. 
Send Log via E-mail: 
The Firewall log can be sent via e-mail. 
Denial of Service 
Thresholds: 
The threshold is used to determine the attempt of establishing 
connection is DoS attack or not. 
SMTP Mail Server: 
The domain name of IP Address of your ISP’s outgoing 
e-mail server. You may find this information when you apply 
for e-mail service from your ISP. 
E-mail Alert to: 
Enter the e-mail address you wish to send to. 
Return Address: 
Enter the e-mail address you wish to send to if the alert 
e-mail cannot be sent to the address above. 
Log Schedule: 
Select from the drop down list that when you wish the alert 
e-mail will be send: 
When Log is Full - The alert e-mail will be sent when log 
space is full. They are about 30 entries. 
Hourly - The alert e-mail will be sent by each hour. 
Daily - The alert e-mail will be sent by each day at midnight.
Weekly - The alert e-mail will be sent by each week. When 
this item is select. 
Day of Sending Alert: 
When “Weekly” is selected as Log Schedule, you can select