[. . . ] Table of Contents CHAPTER 1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 TW100-BRV204 Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Physical Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] This will generate the largest logs, and fill the internal log buffer more quickly. All TCP/UDP/ICMP traffic - These 3 protocols are used by most internet traffic. TCP is used by HTTP, FTP, Telnet, E-mail and other common Internet protocols and applications. UDP is used by Video streams and other communications where speed is more important than guaranteed delivery. ICMP is used by the "ping" and "trace route" applications, and other network diagnostics. · 64 Security Configuration Outgoing Traffic Select the desired option: · All IP traffic - - this will log all outgoing TCP/IP connections, of any type. This will generate the largest logs, and fill the internal log buffer more quickly. All TCP/UDP/ICMP traffic - These 3 protocols are used by most internet traffic. TCP is used by HTTP, FTP, Telnet, E-mail and other common Internet protocols and applications. UDP is used by Video streams and other communications where speed is more important than guaranteed delivery. ICMP is used by the "ping" and "trace route" applications, and other network diagnostics. Selected Traffic only - This selection will reduce the size of the log considerably. Select the traffic you wish to include: · · Attempted access to blocked sites - This will only log Web connections which are blocked by the URL filter. Websites and news groups - This logs successful (allowed) connections to Web Sites and newsgroup servers. · · System Log Select the desired option: · · Router operations (start up, get time etc) - This option will log normal Router operations. Connections to the Web - based interface of this Router - This option will log each connection to the Router itself, whenever the Web-based management interface is used. Other connections and traffic to this Router - This option will log other traffic sent to the Router itself, such as "pings" or RIP (Router Information Protocol) packets. Known DoS attacks and Port Scans - This will log details of DoS (Denial of Service) attacks which have been blocked by the built-in Firewall. This Firewall uses "Stateful Inspection" technology to block packets which are individually valid, but collectively form an attack. Port scans, where a series of ports are checked to see if they are open (available) are also logged. · · VPN View Log Button Clear Log Button Timezone Timezone Syslog Server Enable Syslog Syslog Server Include If enabled, the VPN log will record incoming and outgoing VPN connections. This makes it easier to read the latest entries. Select the correct Timezone for your location. This is required for the date/time shown on the logs to be correct. If enabled, log data will be sent to your Syslog Server. Select the logs you wish to be included in the data sent to the Syslog Server. 65 TW100-BRV204 User Guide E-mail Figure 41: E-Mail Screen Data ­ E-Mail Screen E-Mail Alerts Send E-Mail alert If enabled, an E-mail will be sent immediately if a DoS (Denial of Service) attack is detected. If enabled, the E-mail address information must be provided. E-Mail Logs Send Logs by E-Mail If enabled, logs will be logs to the specified E-mail address. [. . . ] (If you can't connect to it, check the LAN and power connections. ) If the TW100-BRV204 is configured correctly, check your Internet connection (DSL/Cable modem etc) to see that it is working correctly. · · 139 TW100-BRV204 User Guide Problem 2: Solution 2: Some applications do not run properly when using the TW100-BRV204 . The TW100-BRV204 processes the data passing through it, so it is not transparent. Use the Special Applications feature to allow the use of Internet applications which do not function correctly. This should work with almost every application, but: · · It is a security risk, since the firewall is disabled. [. . . ]