User`s manual

Multi-WAN VPN QoS Router
209
IP Spoofing:
Through the packet sniffing, hackers intercept data transmitted
on the network. After they access the information, the IP address
from the sender is changed so that they can access the resource in
the source system.
Win Nuke:
Servers are attacked or trapped by the Trojan program.
Ping of Death:
The system fails because the sent data exceeds the maximum
packet that can be handled by the IP protocol.
Unauthorized
Login:
If intruders into the device are identified, the message will be sent
to the system log.
General Log
The device provides the following warning message. Click to activate the feature. System
error message, blocked regulations, regulation of passage permission, system configuration
change and registration verification.
System Error
Message:
Provides the system log with all kinds of error messages. For
example, wrong settings, occurrence of abnormal functions,
system reactivation, disconnection of PPPoE and so on.
Deny Policies:
If remote users fail to enter the system because of the access
rules; for instance, message will be recorded in the system log.
Allow Policies:
If remote users enter the system because of compliance with
access rules; for instance, message will be recorded in the
system log.
Configuration
Change:
When the system settings are changed, this message will be
sent back to the system log.
Authorized Login:
Successful entry into the system includes login from the remote
end or from the LAN into this device. These messages will be
recorded in the system log.
The following is the description of the four buttons allowing online inquiry into the log.
View System Log:
This option allows users to view system log. The message content can be read online via the
device. They include All Log, System Log, Access Log, Firewall Log, and VPN log, which is