User's Manual

Table Of Contents
54
6.6e Security Log Settings
To view or change the security log settings:
1. Click Settings in the Security Log screen. The “Security Log Settings” screen appears.
2. Select the type of activities that will generate a log message:
Accepted Incoming Connections - activating this check box generates a log message for each successful
attempt to establish an inbound connection to the local network.
Accepted Outgoing Connections - activating this check box generates a log message for each successful
attempt to establish an outgoing connection to the public network.
3. Select the type of blocked events to be listed in the log:
All Blocked Connection Attempts - activating this check box generates log messages for all blocked events.
Other Blocked Events - if “All Blocked Connection Attempts” is un-checked, select specific blocked events
from this list to generate log messages.
4. Click in the “Remote Administration Attempts” check box to write a log message for each remote-
administration connection attempt, whether successful or not.
5. Click in the “Connection States” check box to track connection handling by the firewall and Application
Level Gateways (ALGs).
6. Click Apply to save changes.