1. Home
  2. /
  3. Manuals
  4. /
  5. Zoom
  6. /
  7. 5363
  8. /
  9. 21
Page 101 / 142 Scroll up to view Page 96 - 100
The table below lists all events that can be sent to the SysLog server.
Table 27. SysLog Server Event and Meaning
Event Text
Meaning
An inbound request was made, and accepted, from a
public network client to use a service hosted on the firewall
or a client behind the firewall.
ALLOW: Inbound access
request
An outbound request was made, and accepted, from a
public client to use a service hosted on a public network
server.
ALLOW: Outbound
access request
A request to traverse the firewall by a public or private
client violated the security policy, and was blocked.
DENY: Inbound or
outbound access request
A request was made to the public or private firewall
interface by a public or private client that violated the
security policy, and was blocked.
DENY: Firewall interface
access request
An attempt was made to login to the user interface, and
access was denied because the username and/or
password was incorrect.
FAILURE: User interface
login [Invalid username
or password]
An attempt was made to login to the user interface, and
access was allowed.
SUCCESS: User interface
login
An HTTP GET or POST request was made by an
authenticated user to the user interface.
ALLOW: User interface
access [request]
A known internet attack was detected attempting to
traverse the firewall, and was blocked. Examples of known
internet attacks are Ping Of Death, Teardrop, WinNuke,
XmasTree, SYN Flood, etc.
DENY: Inbound or
outbound [internet attack
name] attack
A known internet attack directed at the firewall itself was
detected and blocked. Examples of known internet attacks
are Ping Of Death, Teardrop, WinNuke, XmasTree, SYN
Flood, etc.
DENY: Firewall interface
[internet attack name]
attack
Firewall Up
The public interface (WAN) connection is up, and the
101
Page 102 / 142
firewall has begun to police traffic, or the firewall was
previously disabled, and the user has enabled it through
the user interface.
Remote configuration management (via HTTP through the
specified port # on the public interface) has been enabled
via the user interface.
Remote config
management enabled
[port#]
Remote configuration management has been disabled via
the user interface.
Remote config
management disabled
The system established the current system time via the
DOCSIS cable modem registration process. The system
time is used by the firewall to timestamp events.
Time Of Day established
The firewall successfully obtained an IP address for the
public network (WAN) interface via DHCP. This process
takes place after the cable modem registration process
successfully completes.
Public Network Interface
up (IP address x.x.x.x)
102
Page 103 / 142
12
Parental Control Menu Options
The Parental Control Menu lets you:
Configure the rules for Internet access based on user or time period
Configure the rules to block certain Internet contents and certain web sites
View the event logs related to parental control
To set up Parental Control, you first set up Policies in the
Basic Setup
submenu. Next,
you assign a user name and password for each user on your network. Finally you apply
the Policies to individual users in the
User Setup
Menu. When you enable Parental
Control, each user must log on to view Internet content. The content a user may access
will be defined by the policy that you assigned to that user. A user profile may optionally
be applied to a specific computer, so that no login is required for users of that computer.
Basic
This Basic Setup page allows you to configure rules which block certain Internet content
and certain Web sites. An override password and access duration timer allows user
override of the content filter settings. When entered, these allow a user Internet access
without the constraint of the rules entered until the timer expires.
To access the Basic page:
1
Click the
Router
menu tab.
2
Then click the
Parental Control
/
Basic Setup
submenu.
Figure 27 shows an example of the menu and Table 28 describes the items you can
select.
Note:
Always remember to click the
Apply
button to complete changes on this page.
103
Page 104 / 142
Figure 27. Example of Basic Setup Page
104
Page 105 / 142
Table 28. Basic Setup Menu Option
Option
Description
Enable Parental
Control
Check the box to enable Parental Control.
Content Policy
Configuration
Enter a name for a content policy, and click
Add New Policy
.
Pull-down list that shows Policy Names that you have created.
Select the policy you want to define or edit.
Content Policy
List
Enter a keyword in the field at the bottom of the keyword list, and
click
Add Keyword
. The keyword is associated with the respective
entries in the
Blocked
and
Allowed
Domain Lists
. See the
User
Setup
page for more details.
Keyword List
Type the domain name and add this domain to be blocked item and
tied to a particular rule name. Blocked Domain feature can be time
constrained to certain parts of the day or night via the settings from
the Parental Control - ToD Filter page.
Blocked
Domain List
Type the domain name and add this domain to be exclusively
passed item and tied to a particular rule name. Allowed Domain
feature can be time constrained to certain parts of the day or night
via the settings from the Parental Control - ToD Filter page.
Allowed
Domain List
Enter the password and access duration timer for user override of
the content filter settings.
Override
Password
105

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top