User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Viewing the Security Log
Chapter 12: Viewing Logs 347
Table 58: Security Log Columns
This column... Displays...
No The log message number
Date The date on which the action occurred, in the format DD:MM:YYYY,
where:
DD=date
MM=month, in abbreviated form
YYYY=year
Time The time at which the action occurred, in the format hh:mm:ss, where:
hh=hour
mm=minutes
ss=seconds
Dir An icon indicating the direction of the connection on which the firewall
acted. This can be one of the following:
•
Incoming connection
• Outgoing connection
• Internal connection
Act An icon indicating the action that the firewall performed on a
connection. For a list of Actions icons, see Security Log Actions on
page 348.
Source
T
he IP address of the connection's source.
Port The source port used for the connection.
Destination The IP address of the connection's destination.