User's Manual

67
System Tools: Intruder Detection Log
The Intruder Detection log displays the possible hacker attacks that may have
occurred to the Internet Gateway. Up to 32 hacker attacks may be logged/listed.
Below is an explanation of the Intruder Detection log display.
Parameter Description
Index Lists up to 32 Intruder detection logs
Time The time in which the attack occurred
Protocol The attack’s protocol type (TCP/UDP)
Source IP (Port) The source IP address and source Port number
of the attack
Dest IP (Port) The destination IP address and destination Port
number of the attack
Event The type of attack