Hacker log – Zoom Gateway/Router Zoom V3 User Manual

Page 54

Advertising
background image

54

Zoom V3 User’s Guide

Hacker Log

Whenever the firewall prevents a packet from being delivered
because of a perceived security threat, the Hacker Log feature

keeps track. You have the option of specifying which types of

messages are logged in and displayed. Note: These options are

directly related to the Protection Policy page described above.

Alert Log

Click to add any of these types of
attacks—SYN Flooding, Ping of Death, IP
Spoofing, Win Nuke—to the log entries in
the system log of policy violations. (To
view the log, go to the Advanced Setup
page and click System Log.)

Log Database Properties
Log Frequency

You have the option of selecting how often
a particular type of hacker event can occur
before the V3 generates a system log
entry. The default is every 100 records or
events. Available range is 1-65535
records/events.

General Log

Click to add General Attacks, Deny
Policies, or Allow Policies to the log
entries in the system log of policy
violations. (To view the log, go to the
Advanced Setup page and click System
Log
.) General Attacks are those most
likely to occur—Land Attack, Reassembly
Attack, ICMP Redirection, and Source
Routing. Deny Policy and Allow Policy are
tied to inbound and outbound firewall
policies (see page 56).

Advertising