Use the Firewall Log
The Firewall Log captures and stores network traffic information such as
the type of data traffic, the time, the source and destination address /
port, as well as the action taken by the firewall.
View Firewall Logs
Step 1:
Select
F
i
r
e
w
a
l
l
L
o
g
F
i
r
e
w
a
l
l
L
o
Page 106
from the
S
E
C
U
R
g
S
E
C
U
R
I
T
Y
C
O
N
F
I
G
U
R
A
T
I
O
I
T
Y
C
O
N
F
I
G
U
R
A
T
I
O
Step 2:
Click on the
information captured in the log:
Time
detected by the firewall.
Action, which states whether the
packet was accepted or denied.
Protocol
Source Address
packet originated
Destination Address
packet was intended.
Source Port
was initiated.
Destination Port
was meant for.
Any Information.
N
command menu.
N
R
e
f
r
e
s
h
button to see the
R
e
f
r
e
s
h
at which the packet was
type of the packet.
from which the
to which the
from which the packet
to which the packet