ZyXEL P-660HN-T1A Support Guide - Page 27
Access Control
View all ZyXEL P-660HN-T1A manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 27 highlights
P-660HN Series Support Notes Web configuration: Advanced Setup, Maintenance -> Logs -> Log Settings, check Access Control and Attacks options depending on your real situation. CI command: sys logs category [access | attack] (2) Enable log function in firewall default policy or in firewall rules. After the above two steps, you can view firewall logs via Web Configurator: Advanced setup, Maintenance -> Logs ->View Log. View the log by CI command: sys logs disp You can also view Centralized logs via mail or syslog, please configure mail server or Unix Syslog server in Web configuration: Advanced Setup, Maintenance -> Logs -> Log Settings. 4. When does the P-660HN-T1A generate the firewall alert? The P-660HN-T1A generates the alert when an attack is detected by the firewall and sends it via Email. So, to send the alert, you must configure the mail server and Email address using Web Configurator, Advanced Setup, Maintenance -> Logs -> Log Settings. You can also specify how frequently you want to receive the alert in it. 5. What is the difference between the log and alert? A log entry is just added to the log inside the P-660HN-T1A and e-mailed together with all other log entries at the scheduled time as configured. An alert is e-mailed immediately after an attacked is detected. 27 All contents copyright © 2010 ZyXEL Communications Corporation.