Chapter 11 Firewall screens 191Nortel Business Secure Router 222 Configuration — BasicsAlertsAlerts are reports on events, such as attacks, that you want to know about rightaway. You can choose to generate an alert when an attack is detected in the AttackAlert screen (Figure 62, check the Generate alert when attack detected checkbox) or when a rule is matched in the Rule Edit screen (see Figure 54) . Configurethe Log Settings screen to have the Business Secure Router send an immediatee-mail message to you when an event generates an alert.SIP-V2(UDP:5060) The Session Initiation Protocol (SIP) is an applicationlayer control (signaling) protocol that handles the settingup, altering and tearing down of voice and multimediasessions over the Internet. SIP is used in VoIP (Voice overIP), the sending of voice signals over the InternetProtocol.SSH(TCP/UDP:22) Secure Shell Remote Logon Program.STRM WORKS(UDP:1558) Stream Works Protocol.SYSLOG(UDP:514) Using syslog, you can send system logs to a UNIX server.TACACS(UDP:49) Login Host Protocol used for (Terminal Access ControllerAccess Control System).TELNET(TCP:23) Telnet is the logon and terminal emulation protocolcommon on the Internet and in UNIX environments. Itoperates over TCP/IP networks. Its primary function is toallow users to log into remote host systems.TFTP(UDP:69) Trivial File Transfer Protocol is an Internet file transferprotocol similar to FTP, but uses the UDP (UserDatagram Protocol) rather than TCP (TransmissionControl Protocol).VDOLIVE(TCP:7000) Another videoconferencing solution.Table 42 Predefined servicesService Description