Actiontec MI424WR User Guide - Page 98
in the Security Log screen. The Security Log Settings screen, Accepted Incoming Connections
View all Actiontec MI424WR manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 98 highlights
Chapter 6 Configuring the Router's Security • FTP port request to 3rd party is forbidden (Possible bounce attack) - a packet has been blocked. • Firewall Rules were changed - the firewall rule set has been modified. • User authentication - a message arrived during login time, including both successful and failed authentication. Security Log Settings To view or change the security log settings: 1. Click Settings in the Security Log screen. The "Security Log Settings" screen appears. 2. Select the type of activities that will generate a log message: • Accepted Incoming Connections - activating this check box generates a log message for each successful attempt to establish an inbound connection to the local network. • Accepted Outgoing Connections - activating this check box generates a log message for each successful attempt to establish an outgoing connection to the public network. 95