attempts on your network. If any packets are seen as harmful, those packets are blocked and a log is kept about the information related to that packet.
Index: (1,2,3 etc.) Refers to the row number.
Time: The time that the action was logged.
Protocol: (IP, UDP etc.) The type of protocol detected.
Source IP (Port): The source IP address of the intruding packet.
Dest IP (Port): The IP address assigned to the destination of the intruding packet.
Event: The type of intrusion.
Display Routing Table
The Display Routing Table screen displays the routing table that the
35