User's Manual
Table Of Contents
- Chapter 1Introduction
- Chapter 2Installation
- Chapter 3Setup
- Chapter 4PC Configuration
- Chapter 5Operation and Status
- Chapter 6Advanced Features
- Chapter 7Advanced Administration
- Appendix ATroubleshooting
- Appendix BAbout Wireless LANs
- Appendix CSpecifications
Advanced Administration
75
Logs
The Logs record various types of activity on the Wireless Router This data is useful for
troubleshooting, but enabling all logs will generate a large amount of data and adversely affect
performance.
Since only a limited amount of log data can be stored in the Wireless Router, log data can also
be E-mailed to your PC.
Figure 43: Logs Screen
Data - Logs Screen
Enable Logs
Outgoing
Connections
If selected, Outgoing Internet connections are logged. Normally,
the (Internet) "Destination" will be shown as an IP address. But if
the "URL Filter" is enabled, the "Destination" will be shown as a
URL.
Access Control
If enabled, the log will include attempted outgoing connections
which have been blocked by the "Access Control" feature.
DoS Attacks
If enabled, this log will show details of DoS (Denial of Service)
attacks which have been blocked by the built-in Firewall.