4.8.4.1. Click Intrusion Event Log on the Log page.
The Intrusion Event Log Table appears, including each intrusion event entry’s Record Name and Intrusion Type, seen in
FIGURE
FIGURE 4-23: Intrusion Event Log Table
4.8.4.2.Optional. Click Refresh to obtain the most current data.
4.8.4.3.Optional. Click Clear to delete all the log information.
4.8.5.To View Wireless Event Log:
4.8.5.1.Click Wireless Event Log on the Log page.
The Session Event Log Table appears, including each wireless event entry’s Time, Severity and Description, seen in
FIGURE
FIGURE 4-24: Wireless Event Log Table
4.8.5.2.Optional. Click Refresh to obtain the most current data.
4.8.5.3.Optional. Click Clear to delete all the log information.
4.8.6.To Disable Access Log on Your Router:
4.8.6.1.On the Log page, click Disabled next to Access Log.
4.8.6.2.Click Apply.
40