beautypg.com

Use the firewall log, View firewall logs – Compex Systems WPE53G User Manual

Page 153

background image

Page 147

Use the Firewall Log

The Firewall Log captures and stores network traffic information such as

the type of data traffic, the time, the source and destination address /

port, as well as the action taken by the firewall.

View Firewall Logs

(Available in Wireless Routing Client and Gateway modes)

Step 1:

Select

F

F

i

i

r

r

e

e

w

w

a

a

l

l

l

l

L

L

o

o

g

g

from the

S

S

E

E

C

C

U

U

R

R

I

I

T

T

Y

Y

C

C

O

O

N

N

F

F

I

I

G

G

U

U

R

R

A

A

T

T

I

I

O

O

N

N

command menu.

Step 2:

Click on the

R

R

e

e

f

f

r

r

e

e

s

s

h

h

button to see the

information captured in the log:

ƒ

Time

at which the packet was

detected by the firewall.

ƒ

Action

, which states whether the

packet was accepted or denied.

ƒ

Protocol

type of the packet.

ƒ

Source Address

from which the

packet originated

ƒ

Destination Address

to which the

packet was intended.

ƒ

Source Port

from which the packet

was initiated.

ƒ

Destination Port

to which the packet

was meant for.

ƒ

Any

Information

.