Reference Manual for the ProSafe Wireless 802.11g Firewall/Print Server Model FWG114P
6-16 Firewall Protection and Content Filtering
December 2003, M-10177-01
Log entries are described in Table 6-1
Log action buttons are described in Table 6-2
What to Include in Event Log
Use these checkboxes to determine which events are included in the log. Checking all options will
increase the size of the log, so it is good practice to disable any events which are not really
required.
• Known DoS attacks and Port Scans - If checked, Denial of Service attacks, as well as port
scans, will be logged.
• Attempted access to blocked sites - If checked, the router will log attempts to access sites
which are blocked by the "Block Sites" filter.
Table 6-1. Log entry descriptions
Field Description
Date and Time The date and time the log entry was recorded.
Description or
Action
The type of event and what action was taken if any.
Source IP The IP address of the initiating device for this log entry.
Source port and
interface
The service port number of the initiating device, and whether it
originated from the LAN or WAN
Destination The name or IP address of the destination device or website.
Destination port
and interface
The service port number of the destination device, and whether
it’s on the LAN or WAN.
Table 6-2. Log action buttons
Field Description
Refresh Refreshes the log screen.
Clear Log Clears the log entries.
Send Log Emails the log immediately.