Log Table - SonicWALL SonicOS Enhanced 2.2 Administrator's Manual

Sonicwall internet security appliance
Table of Contents

Advertisement

The IP address of the machine under attack and the source of the attack is displayed. In most attacks,
the source address shown is fake and does not reflect the real source of the attack.
Tip!
Some network conditions can produce network traffic that appears to be an attack, even if no one is
deliberately attacking the LAN. Verify the log messages with SonicWALL Tech Support before
contacting your ISP to determine the source of the attack.

Log Table

The log is displayed in a table and is sortable by column. The log table columns include:
Time - the date and time of the event.
Message - provides description of the event.
Source - displays source network and IP address.
Destination - displays the destination network and IP address.
Notes - provides additional information about the event.
Rule - notes Network Access Rule affected by event.
Refresh
Clicking the Refresh button updates Log events.
Clear Log
Clicking Clear Log deletes the contents of the log.
E-mail Log
If you have configured the SonicWALL to e-mail log files, clicking E-mail Log sends the current log files
to the e-mail address specified in the Log>Automation>E-mail section.
Note:
The SonicWALL can alert you of important events, such as an attack to the SonicWALL. Alerts are
immediately sent via e-mail, either to an e-mail address or to an e-mail pager. For sending alerts, you
must enter your e-mail address and server information in the Log>Automation page.
Page 160 SonicWALL SonicOS Standard Administrator's Guide

Advertisement

Table of Contents
loading

Table of Contents