Owner's Manual
Table Of Contents
- Introduction
- Connecting the Router
- Configuring My Network Settings
- Using Network Connections
- Configuring the Router’s Security
- Using Parental Controls
- Using Advanced Settings
- Firmware Upgrade
- Firmware Restore
- Configuration File
- System Settings
- Date and Time
- Scheduler Rules
- Routing
- IP Address Distribution
- Diagnostics
- Restoring Default Settings
- Reboot the Router
- MAC Cloning
- ARP (Address Resolution Protocol) Table
- Users
- QoS
- Local Administration
- Remote Administration
- Dynamic DNS
- DNS Server
- Network Objects
- Universal Plug and Play (UPnP)
- Protocols
- Monitoring the Router
- Troubleshooting
- Quality of Service
- Specifications
- Notices
- Limited Warranty

68
Actiontec Broadband Router User Manual
69
Chapter 5 Configuring the Router’s Security
• FTP port request to 3rd party is forbidden (Possible bounce attack) - a
packet has been blocked.
• Firewall Rules were changed - the firewall rule set has been modified.
• User authentication - a message arrived during login time, including both
successful and failed authentication.
Security Log Settings
To view or change the security log settings:
1. Click Settings in the Security Log screen. The “Security Log Settings” screen
appears.
2. Select the type of activities that will generate a log message:
• Accepted Incoming Connections - activating this check box generates a
log message for each successful attempt to establish an inbound connection
to the local network.
• Accepted Outgoing Connections - activating this check box generates a
log message for each successful attempt to establish an outgoing connection
to the public network.