User manual
Error! Style not defined.. Error! Style not defined.
65
Field Description
Log
Destination
Specifies how attempted violations of the
firewall settings will be tracked. Records of
such events can be sent via Ethernet to be
handled by a system utility Ethernet to
(Trace) or can e-mailed to specified
administrators.
E-mail ID of
Admin 1/2/3
Specifies the e-mail addresses of the
administrators who should receive notices
of any attempted firewall violations. Type
the addresses in standard internet e-mail
address format, e.g.,
jxsmith@onecompany.com.
The e-mail message will contain the time
of the violation, the source address of the
computer responsible for the violation, the
destination IP address, the protocol being
used, the source and destination ports,
and the number violations occurring the
previous 30 minutes. If the ICMP protocol
were being used, then instead of the
source and destination ports, the e-mail
will report the ICMP code and type.
3. Click
Submit
.
4. Select
Admin
>
Commit & Reboot
and click
Commit
to
save your changes to permanent storage.
!
The IP filter feature enables you to create rules that control the
forwarding of incoming and outgoing data between your LAN and
the Internet. This chapter explains how to create IP filter rules.
Viewing Your IP Filter Configuration
Select
Services
>
IP Filter
. The IP Filter page displays: