[. . . ] Table of Contents CHAPTER 1 INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 TW100-BRV304 Features. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Package Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Physical Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] If necessary, you can define a new Service on the "Services" screen, by defining the protocols and port numbers used by the Service. Select the desired action for packets covered by this rule: This determines whether packets covered by this rule are logged. Select the desired option. Action Log 64 Security Configuration Logs The Logs record various types of activity on the TW100-BRV304. This data is useful for troubleshooting, but enabling all logs will generate a large amount of data and adversely affect performance. Since only a limited amount of log data can be stored in the TW100-BRV304, log data can also be E-mailed to your PC or sent to a Syslog Server. Figure 40: Logs Screen Data - Logs Screen Enable Logs Incoming Traffic Select the desired option: · All IP traffic - this will log all incoming TCP/IP connections, of any type. This will generate the largest logs, and fill the internal log buffer more quickly. All TCP/UDP/ICMP traffic - These 3 protocols are used by most internet traffic. TCP is used by HTTP, FTP, Telnet, E-mail and other common Internet protocols and applications. UDP is used by Video streams and other communications where speed is more important than guaranteed delivery. ICMP is used by the "ping" and "trace route" applications, and other network diagnostics. · 65 TW100-BRV304 User's Guide Outgoing Traffic Select the desired option: · All IP traffic - - this will log all outgoing TCP/IP connections, of any type. This will generate the largest logs, and fill the internal log buffer more quickly. All TCP/UDP/ICMP traffic - These 3 protocols are used by most internet traffic. TCP is used by HTTP, FTP, Telnet, E-mail and other common Internet protocols and applications. UDP is used by Video streams and other communications where speed is more important than guaranteed delivery. ICMP is used by the "ping" and "trace route" applications, and other network diagnostics. Selected Traffic only - This selection will reduce the size of the log considerably. Select the traffic you wish to include: · · Attempted access to blocked sites - This will only log Web connections which are blocked by the URL filter. Websites and news groups - This logs successful (allowed) connections to Web Sites and newsgroup servers. · · System Log Select the desired option: · · Router operations (start up, get time etc) - This option will log normal Router operations. Connections to the Web - based interface of this Router - This option will log each connection to the Router itself, whenever the Web-based management interface is used. Other connections and traffic to this Router - This option will log other traffic sent to the Router itself, such as "pings" or RIP (Router Information Protocol) packets. Known DoS attacks and Port Scans - This will log details of DoS (Denial of Service) attacks which have been blocked by the built-in Firewall. This Firewall uses "Stateful Inspection" technology to block packets which are individually valid, but collectively form an attack. [. . . ] (If you can't connect to it, check the LAN and power connections. ) If the TW100-BRV304 is configured correctly, check your Internet connection (DSL/Cable modem etc) to see that it is working correctly. · · 139 TW100-BRV304 User's Guide Problem 2: Solution 2: Some applications do not run properly when using the TW100BRV304. The TW100-BRV304 processes the data passing through it, so it is not transparent. Use the Special Applications feature to allow the use of Internet applications which do not function correctly. This should work with almost every application, but: · · It is a security risk, since the firewall is disabled. [. . . ]