View The Action Log; Monitor Network Traffic With Packet Logging - F-SECURE CLIENT SECURITY 9.00 Administrator's Manual

Hide thumbs Also See for CLIENT SECURITY 9.00:
Table of Contents

Advertisement

Field
Services
Remote address
Remote port
Local address
Local port

View the action log

If a program, such as a network game, does not work, you can check in the action log if application control
has denied the program from connecting to the Internet.
The action log is a text file ( action.log ) that automatically collects information about the network
connections. The maximum size of the file is 10 MB. After the file becomes full, the old log entries are deleted.
To view the action log :
1. On the main page, click Settings.
2. Select
Network connections
3. Click
Show action
The action log opens in a default text editor or viewer, for example, Notepad.

Monitor network traffic with packet logging

You can start packet logging if you want to gather information about the IP network traffic.
How does packet logging work
The packet log collects information about the IP network traffic.
By default, the packet logging is turned off. Packet logging is mainly aimed at experienced users who are
familiar with computer networks.
You can turn the packet logging on if you have created your own set of firewall rules , and want to check
how they block traffic. You can also do this if you suspect malicious network activity.
Information is gathered into 10 files ( packetlog.0-packetlog.9 ). Each time you turn on the logging,
the packet log is collected into a new file. After the tenth file becomes full, the next log is collected again to
the first file. In this way, you can view the previous logs while a new log is generated.
In addition to the IP traffic, the packet log also collects information about other types of network traffic, for
example, about the protocols needed by your Local Area Network (LAN). This information includes, for
example, routing information.
The packet log is in hexadecimal format and supports tcpdump format. This allows you to open the log
files also in a packet logging program other than the default packet log viewer. You can also use a network
protocol analyzer program to analyze the contents further.
Start packet logging
You can start packet logging if you suspect malicious network activity, or for example, a network game stops
working.
To start logging:
1. On the main page, click Settings.
2. Select
Network connections
Logging
.
log.
Logging
.
F-Secure Client Security | Local host operations | 125
Description
Shows the firewall services to which this traffic
matched.
The IP address of the remote computer.
The port on the remote computer.
The IP address of your own computer.
The port on your own computer.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the CLIENT SECURITY 9.00 and is the answer not in the manual?

This manual is also suitable for:

Client security

Table of Contents