User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Viewing the Security Log
348 Check Point Safe@Office User Guide
This column... Displays...
Service The protocol and destination port used for the connection.
Reason The reason the action was logged.
Rule The number of the firewall rule that was executed.
Net The internal network where the action occurred.
Information Additional information about the logged action.
Table 59: Security Log Actions
Action Icon Description
Connection accepted
The firewall accepted a connection.
Connection decrypted
The firewall decrypted a connection.
Connection dropped
The firewall dropped a connection.
Connection encrypted
The firewall encrypted a connection.
Connection rejected
The firewall rejected a connection.
URL Allowed
The firewall allowed a URL.
URL Blocked
The firewall blocked a URL.
Spam Stamped
VStream Antispam marked an email as spam.
Spam Detected
VStream Antispam rejected a spam email.
Connection Monitored
A security event was monitored; however, it was not blocked,
due to the current configuration.
Mail Allowed
VStream Antispam logged a non-spam email.