4.8.4.1. Click Intrusion Event Log on the Log page.
The Intrusion Event Log Table appears, including each
intrusion event entry's Record Name and Intrusion Type, seen in
4.8.4.2. Optional. Click Refresh to obtain the most current data.
4.8.4.3. Optional. Click Clear to delete all the log information.
4.8.5. To View Wireless Event Log:
4.8.5.1. Click Wireless Event Log on the Log page.
The Session Event Log Table appears, including each
wireless event entry's Time, Severity and Description, seen in
4.8.5.2. Optional. Click Refresh to obtain the most current data.
4.8.5.3. Optional. Click Clear to delete all the log information.
4.8.6. To Disable Access Log on Your Router:
4.8.6.1. On the Log page, click Disabled next to Access Log.
4.8.6.2. Click Apply.
FIGURE 4-23:
FIGURE 4-23: Intrusion Event Log Table
FIGURE 4-24:
FIGURE 4-24: Wireless Event Log Table
40