User's Manual

Table Of Contents
802.11a/g Router User’s Guide
How to View the System Log
The 802.11a/g Router maintains a system log that you can use to track events that have occurred in the
system. Such event messages can sometimes be helpful in determining the cause of a problem that you
may have encountered.
You can select System Log on the left to view log events recorded in the system. The System Log
entries are shown in the main screen along with the log level, the severity level of messages that are
being displayed (a low number such as 2 means critical), and the uptime, the amount of time since the
802.11a/g Router was last reset. The maximum number of entries is 128. If there are more than 128
entries, older entries will be deleted.
Security Log
The 802.11 a/g Router maintains another log table for security logs. For each filter rule configured, the
802.11 a/g Router will monitor the traffic matching the rule. Once the rule’s hitting rate exceeds a
certain degree (twice per 10 seconds, that is, more than one packet matching the rule in 10 seconds), a
security log is generated and stored in the security log table. A security log entry contains a description
regarding the event and a time stamp when the event happened. You can see the current logged
security events from this page. Those log entries are not saved into flash, so all log messages are
removed after the system reboot. The maximum number of entries is 128. If there are more than 128
entries, older entries will be deleted.
55