Use the Firewall Log

The Firewall Log captures and stores network traffic information such as the type of data traffic, the time, the source and destination address / port, as well as the action taken by the firewall.

View Firewall Logs

(Available in Wireless Routing Client and Gateway modes)

Step 1:

Select Firewall Log from the SECURITY CONFIGURATION command menu.

Step 2:

Click on the Refresh button to see the information captured in the log:

ƒ Time at which the packet was detected by the firewall.

ƒ Action, which states whether the

packet was accepted or denied. ƒ Protocol type of the packet.

ƒ Source Address from which the packet originated

ƒ Destination Address to which the packet was intended.

ƒ Source Port from which the packet was initiated.

ƒ Destination Port to which the packet was meant for.

ƒ Any Information.

Page 147

Page 153
Image 153
Compex Systems WPE53G manual Use the Firewall Log, View Firewall Logs