Specifications

Page 149
Use the Firewall Log
The Firewall Log captures and stores network traffic information such as
the type of data traffic, the time, the source and destination address /
port, as well as the action taken by the firewall.
View Firewall Logs
Step 1:
Select
F
F
i
i
r
r
e
e
w
w
a
a
l
l
l
l
L
L
o
o
g
g
from the
S
S
E
E
C
C
U
U
R
R
I
I
T
T
Y
Y
C
C
O
O
N
N
F
F
I
I
G
G
U
U
R
R
A
A
T
T
I
I
O
O
N
N command menu.
Step 2:
Click on the
R
R
e
e
f
f
r
r
e
e
s
s
h
h button to see the
information captured in the log:
Time at which the packet was detected
by the firewall.
Action, which states whether the packet
was accepted or denied.
Protocol type of the packet.
Source Address from which the packet
originated
Destination Address to which the packet
was intended.
Source Port from which the packet was
initiated.
Destination Port to which the packet was
meant for.
Any Information.