Specifications
84
Firewall Logs
As described previously, from the Firewall Configuration page the data
traffic to be logged by the access point can be defined.
The Firewall Log also records any UDP flooding or SYN flooding attacks
on your network.
Firewall Logs
Click Firewall Logs from the Securit
y
Configuration menu.
1
1. A firewall log entry consists
of:
Time at which the packet
was detected by the
firewall.
Action, which states
whether the packet was
accepted or denied.
Protocol type of the
packet.
Source Address from which
the packet originated
Destination Address to
which the packet was
intended.
Source Port from which the
packet was initiated.
Destination Port to which
the packet was meant for.
Any Information.
2. Click Refresh, to refresh the
log records.
2