ZyXEL P-660HN-T1A Support Guide - Page 27

Access Control

Page 27 highlights

P-660HN Series Support Notes  Web configuration: Advanced Setup, Maintenance -> Logs -> Log Settings, check Access Control and Attacks options depending on your real situation.  CI command: sys logs category [access | attack] (2) Enable log function in firewall default policy or in firewall rules. After the above two steps, you can view firewall logs via  Web Configurator: Advanced setup, Maintenance -> Logs ->View Log.  View the log by CI command: sys logs disp You can also view Centralized logs via mail or syslog, please configure mail server or Unix Syslog server in Web configuration: Advanced Setup, Maintenance -> Logs -> Log Settings. 4. When does the P-660HN-T1A generate the firewall alert? The P-660HN-T1A generates the alert when an attack is detected by the firewall and sends it via Email. So, to send the alert, you must configure the mail server and Email address using Web Configurator, Advanced Setup, Maintenance -> Logs -> Log Settings. You can also specify how frequently you want to receive the alert in it. 5. What is the difference between the log and alert? A log entry is just added to the log inside the P-660HN-T1A and e-mailed together with all other log entries at the scheduled time as configured. An alert is e-mailed immediately after an attacked is detected. 27 All contents copyright © 2010 ZyXEL Communications Corporation.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118

P-660HN Series Support Notes
27
All contents copyright © 2010 ZyXEL Communications Corporation.
Web configuration: Advanced Setup,
Maintenance -> Logs -> Log
Settings
, check
Access Control
and
Attacks
options depending on
your real situation.
CI command:
sys logs category [access | attack]
(2) Enable log function in firewall default policy or in firewall rules.
After the above two steps, you can view firewall logs via
Web Configurator: Advanced setup,
Maintenance -> Logs ->View
Log.
View the log by CI command:
sys logs disp
You can also view Centralized logs via
mail
or
syslog
, please configure mail
server or Unix Syslog server in Web configuration: Advanced Setup,
Maintenance -> Logs -> Log Settings
.
4. When does the P-660HN-T1A generate the firewall alert?
The P-660HN-T1A generates the alert when an attack is detected by the
firewall and sends it via Email. So, to send the alert, you must configure the
mail server and Email address using Web Configurator, Advanced Setup,
Maintenance -> Logs -> Log Settings
. You can also specify how frequently
you want to receive the alert in it.
5. What is the difference between the log and alert?
A log entry is just added to the log inside the P-660HN-T1A and e-mailed
together with all other log entries at the scheduled time as configured. An alert
is e-mailed immediately after an attacked is detected.