Netopia 6.3 Stereo System User Manual


 
22
Section 3 General
Combination NAT Bypass Configuration
Specific pinholes and Default Server settings, each directed to different
LAN devices, can be used together.
Security Monitor
The Security Monitor detects security related events including common
types of malicious attacks and writes them to a dedicated security log file.
You view this log file from either:
Cayman Web interface
Text-based command line interface using a telnet or serial port facility
The log provides information useful in identifying a specific type of attack
and tracing its origin. The log maintains 100 entries, and requires a manual
reset once full. This preserves for troubleshooting purposes the acquired
information about specific attacks, their frequency and tracing informa-
tion.
COS 6.3 Security Monitor software reports the following eight event types:
IP Source Address Spoofing
Source Routing
Subnet Broadcast Amplification
Illegal Packet Size (Ping of Death)
Port Scan (TCP/UDP)
Excessive Pings
Admin Login Failure
MAC Address Spoofing
Creating a pinhole or enabling a Default Server allows inbound access
to the specified LAN station. Contact your Network Administrator for
LAN security questions.
See page 80 for more information about the Security Monitoring Log.