Administrator's Handbook
Firewall Log
Firewall Log
When you click
The Gateway detects security related events including common types of malicious attacks and writes them to a
dedicated Firewall log file. You view this log file from either:
◆
®
Motorola Netopia
◆
Text-based command line interface using telnet
The log provides information useful in identifying a specific type of attack and tracing its origin. The log maintains
100 entries, and requires a manual reset once full. This preserves for troubleshooting purposes the acquired infor-
mation about specific attacks, their frequency and tracing information.
38
, the Firewall Log page appears.
Web interface