Netopia 6.3 User Manual

Page 22

Advertising
background image

22

Section 3

General

Combination NAT Bypass Configuration

Specific pinholes and Default Server settings, each directed to different
LAN devices, can be used together.

Security Monitor

The Security Monitor detects security related events including common
types of malicious attacks and writes them to a dedicated security log file.
You view this log file from either:

Cayman Web interface

Text-based command line interface using a telnet or serial port facility

The log provides information useful in identifying a specific type of attack
and tracing its origin. The log maintains 100 entries, and requires a manual
reset once full. This preserves for troubleshooting purposes the acquired
information about specific attacks, their frequency and tracing informa-
tion.

COS 6.3 Security Monitor software reports the following eight event types:

IP Source Address Spoofing

Source Routing

Subnet Broadcast Amplification

Illegal Packet Size (Ping of Death)

Port Scan (TCP/UDP)

Excessive Pings

Admin Login Failure

MAC Address Spoofing

Creating a pinhole or enabling a Default Server allows inbound access
to the specified LAN station. Contact your Network Administrator for
LAN security questions.

See

page 80

for more information about the Security Monitoring Log.

Advertising