User`s manual

Content Security Gateway User’s Manual
- 187 -
What is Log?
Log records all connections that pass through the Content Security Gateway’s control policies. Traffic log’s
parameters are setup when setting up control policies. Traffic logs record the details of packets such as the
start and stop time of connection, the duration of connection, the source address, the destination address and
services requested, for each control policy. Event logs record the contents of System Configuration changes
made by the Administrator such as the time of change, settings that change, the IP address used to log on,
etc.
How to use the Log
The Administrator can use the log data to monitor and manage the device and the networks. The
Administrator can view the logged data to evaluate and troubleshoot the network, such as pinpointing the
source of traffic congestions.
4.7.1.1 Traffic
The Administrator queries the Content Security Gateway for information, such as source address, destination
address, start time, and Protocol port of all connections.
Entering the Traffic Log window
Step 1. Click the Traffic option under Log menu to enter the Traffic Log window.
Traffic Log Table
The table in the Traffic Log window displays current System statuses:
Definition:
Time: The start time of the connection.
Source: IP address of the source network of the specific connection.
Destination: IP address of the destination network of the specific connection.
Protocol: Protocol type of the specific connection.
ÍÍ