Security Configuration

Logs

The Logs record various types of activity on the TW100-BRV204 . This data is useful for troubleshooting, but enabling all logs will generate a large amount of data and adversely affect performance.

Since only a limited amount of log data can be stored in the TW100-BRV204 , log data can also be E-mailed to your PC or sent to a Syslog Server.

Figure 40: Logs Screen

Data - Logs Screen

Enable Logs

Incoming Traffic Select the desired option:

All IP traffic - this will log all incoming TCP/IP connections, of any type. This will generate the largest logs, and fill the internal log buffer more quickly.

All TCP/UDP/ICMP traffic - These 3 protocols are used by most internet traffic. TCP is used by HTTP, FTP, Telnet, E-mail and other common Internet protocols and applications. UDP is used by Video streams and other communications where speed is more im- portant than guaranteed delivery. ICMP is used by the "ping" and "trace route" applications, and other network diagnostics.

61

Page 65
Image 65
TRENDnet BRV204 manual Data Logs Screen, Enable Logs