Buffalo Technology WHR-G54S Network Router User Manual


 
38
Network Configuration (Intrusion Detector)
To enable intrusion detector, choose
Enable or Enable (Apply packet lter rules)
from the Intrusion Detector drop-down
box. If packet lter rules are applied,
packets will be ltered with packet lter
rules before Intrusion Detector is applied.
Blocking IP spoong blocks packets from
devices using an IP address that is not
their own.
In the Threshold Value box, enter the
number of times an event has to occur
before you receive notication.
To congure your email alerts, enter your
email address and mail server information.
You may make up a sender email address,
such as “alert@router.com”. Alert emails will appear to come from this address.
Intrusion detector also blocks unauthorized access attempts and suspicious trafc from
WAN-side devices (the internet).