beautypg.com

Use the firewall log, View firewall logs – Teletronics EZStation5 User Manual

Page 156

background image

Page 156

Use the Firewall Log

The Firewall Log captures and stores network traffic information such as

the type of data traffic, the time, the source and destination address /

port, as well as the action taken by the firewall.

View Firewall Logs

Step 1:

Select

F

F

i

i

r

r

e

e

w

w

a

a

l

l

l

l

L

L

o

o

g

g

from the

S

S

E

E

C

C

U

U

R

R

I

I

T

T

Y

Y

C

C

O

O

N

N

F

F

I

I

G

G

U

U

R

R

A

A

T

T

I

I

O

O

N

N

command menu.

Step 2:

Click on the

R

R

e

e

f

f

r

r

e

e

s

s

h

h

button to see the

information captured in the log:

ƒ

Time

at which the packet was detected

by the firewall.

ƒ

Action

, which states whether the packet

was accepted or denied.

ƒ

Protocol

type of the packet.

ƒ

Source Address

from which the packet

originated

ƒ

Destination Address

to which the packet

was intended.

ƒ

Source Port

from which the packet was

initiated.

ƒ

Destination Port

to which the packet was

meant for.

ƒ

Any

Information

.