User Manual
SmartAX MT800 ADSL CPE
Chapter 4 Web-based Management
4-25
were being used, then instead of the source and
destination ports, the e-mail will report the ICMP code and
type.
4.11.2 Managing the Blacklist
If data packets are received that violate the firewall settings or
any of the IP Filter rules, then the source IP address of the offending
packets can be blocked from such accesses for a specified period of
time. The source computer remains on the black list for the period of
time that you specify. You can enable or disable use of the black list
using the settings described above.
To view the list of currently blacklisted computers, click the
Black List button at the bottom of the Firewall Configuration page.
The table displays the following information for each entry:
Figure 4-17 Inquire the Hosts in the Blacklist
z
Host IP Address: The IP address of the computer that
sent the packet(s) that caused the violation.
z
Reason: A short description of the type of violation. If the
packet violated an IP Filter rule, the custom text from the
Log Tag field will display.