Use the firewall log, View firewall logs – Compex Systems WPE53G User Manual
Page 153
Page 147
Use the Firewall Log
The Firewall Log captures and stores network traffic information such as
the type of data traffic, the time, the source and destination address /
port, as well as the action taken by the firewall.
View Firewall Logs
(Available in Wireless Routing Client and Gateway modes)
Step 1:
Select
F
F
i
i
r
r
e
e
w
w
a
a
l
l
l
l
L
L
o
o
g
g
from the
S
S
E
E
C
C
U
U
R
R
I
I
T
T
Y
Y
C
C
O
O
N
N
F
F
I
I
G
G
U
U
R
R
A
A
T
T
I
I
O
O
N
N
command menu.
Step 2:
Click on the
R
R
e
e
f
f
r
r
e
e
s
s
h
h
button to see the
information captured in the log:
Time
at which the packet was
detected by the firewall.
Action
, which states whether the
packet was accepted or denied.
Protocol
type of the packet.
Source Address
from which the
packet originated
Destination Address
to which the
packet was intended.
Source Port
from which the packet
was initiated.
Destination Port
to which the packet
was meant for.
Any
Information
.