Chapter 13. Configuring Firewall Settings
137
Field Description
Log Destination
Specifies how attempted violations of the firewall
settings will be tracked. Records of such events
can be sent via Ethernet to be handled by a
system utility (Trace) or can e-mailed to specified
administrators.
E-mail ID of
Admin 1/2/3
Specifies the e-mail addresses of the
administrators who should receive notices of any
attempted firewall violations. Type the addresses
in standard internet e-mail address format, e.g.,
jxsmith@onecompany.com.
The e-mail message will contain the time of the
violation, the source address of the computer
responsible for the violation, the destination IP
address, the protocol being used, the source and
destination ports, and the number violations
occurring the previous 30 minutes. If the ICMP
protocol is being used, then instead of the source
and destination ports, the e-mail will report the
ICMP code and type.
3. Click .
4. If you want the changes to be permanent, follow the
instructions on page
46 to commit them.