Wireless Controller
Figure 191: Facility settings for Logging
The display for logging can be customized based on where the logs are sent, either
the Event Log viewer in the GUI (the Event Log viewer is in the
or a remote Syslog server for later review. E-mail logs, discussed in a subsequent
section, follow the same configuration as logs configured for a Syslog server.
Tools > Log Settings > Logs Configuration
This page allows you to determine the type of traffic through the controller that is
logged for display in Syslog, E-mailed logs, or the Event Viewer. Denial of service
attacks, general attack information, login attempts, dropped packets, and similar
events can be captured for review by the IT administrator.
Traffic through each network segment (LAN, Option, DMZ) can be tracked based on
whether the packet was accepted or dropped by the firewall.
330
User Manual
Status > Logs
page)