TRENDnet TDM-C400 User's Guide - Page 137

Click, If you want the changes to be permanent, follow the, instructions on to commit them.

Page 137 highlights

Chapter 13. Configuring Firewall Settings Field Log Destination E-mail ID of Admin 1/2/3 Description Specifies how attempted violations of the firewall settings will be tracked. Records of such events can be sent via Ethernet to be handled by a system utility (Trace) or can e-mailed to specified administrators. Specifies the e-mail addresses of the administrators who should receive notices of any attempted firewall violations. Type the addresses in standard internet e-mail address format, e.g., [email protected]. The e-mail message will contain the time of the violation, the source address of the computer responsible for the violation, the destination IP address, the protocol being used, the source and destination ports, and the number violations occurring the previous 30 minutes. If the ICMP protocol is being used, then instead of the source and destination ports, the e-mail will report the ICMP code and type. 3. Click . 4. If you want the changes to be permanent, follow the instructions on page 46 to commit them. 137

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205

Chapter 13. Configuring Firewall Settings
137
Field
Description
Log Destination
Specifies how attempted violations of the firewall
settings will be tracked. Records of such events
can be sent via Ethernet to be handled by a
system utility (
Trace
) or can e-mailed to specified
administrators.
E-mail ID of
Admin 1/2/3
Specifies the e-mail addresses of the
administrators who should receive notices of any
attempted firewall violations. Type the addresses
in standard internet e-mail address format, e.g.,
.
The e-mail message will contain the time of the
violation, the source address of the computer
responsible for the violation, the destination IP
address, the protocol being used, the source and
destination ports, and the number violations
occurring the previous 30 minutes. If the ICMP
protocol is being used, then instead of the source
and destination ports, the e-mail will report the
ICMP code and type.
3. Click
.
4.
If you want the changes to be permanent, follow the
instructions on page 46 to commit them.