User`s manual
    Multi-WAN  VPN  QoS  Router 
209 
IP Spoofing: 
Through the packet sniffing, hackers intercept data transmitted 
on the network. After they access the information, the IP address 
from the sender is changed so that they can access the resource in 
the source system. 
Win Nuke: 
Servers are attacked or trapped by the Trojan program. 
Ping of Death: 
The system fails because the sent data exceeds the maximum 
packet that can be handled by the IP protocol. 
Unauthorized 
Login: 
If intruders into the device are identified, the message will be sent 
to the system log. 
General Log   
The device provides the following warning message. Click to activate the feature. System 
error  message,  blocked  regulations,  regulation  of  passage  permission,  system  configuration 
change and registration verification.   
System Error 
Message: 
Provides the system log with all kinds of error messages. For 
example, wrong settings, occurrence of abnormal functions, 
system reactivation, disconnection of PPPoE and so on. 
Deny Policies: 
If remote users fail to enter the system because of the access 
rules; for instance, message will be recorded in the system log. 
Allow Policies: 
If remote users enter the system because of compliance with 
access rules; for instance, message will be recorded in the 
system log. 
Configuration 
Change: 
When the system settings are changed, this message will be 
sent back to the system log. 
Authorized Login: 
Successful entry into the system includes login from the remote 
end or from the LAN into this device. These messages will be 
recorded in the system log. 
The following is the description of the four buttons allowing online inquiry into the log. 
View System Log: 
This option allows users to view system log. The message content can be read online via the 
device. They include All Log, System Log, Access Log, Firewall Log, and VPN log, which is 










