7 firewall log, Figure 53 firewall: firewall logs, Table 38 firewall: url filter: domains filtering – ZyXEL Communications Prestige 794M User Manual
Page 76: Table 39 firewall: firewall logs

Prestige 794M User’s Guide
Chapter 6 Firewall
76
The following table describes the labels in this screen.
6.7 Firewall Log
Use the Firewall Log screen to set the Prestige to log firewall events (such as when an attack
is detected). View the event logs in the Event Log screen.
Click Configuration, Firewall and Firewall Log in the navigation panel to display the screen
as shown.
Figure 53 Firewall: Firewall Logs
The following table describes the labels in this screen.
Table 38 Firewall: URL Filter: Domains Filtering
LABEL
DESCRIPTION
Domain Name
Domain Name
Enter a domain name in this field.
Type
Specify whether to allow access (Trusted Domain) or deny access (Forbidden
Domain) from the drop-down list box.
Apply
Click Apply to add the keyword to the table below.
Trusted Domain
This read-only table lists the domains to which the Prestige allows access.
Name
This field displays the name of the filter rule.
Domain
This field displays the specified domain.
Forbidden Domain This read-only table lists the domains to which the Prestige blocks access.
Name
This field displays the name of the filter rule.
Domain
This field displays the specified domain.
Delete
Click Delete to remove the select keyword from this table.
Table 39 Firewall: Firewall Logs
LABEL
DESCRIPTION
Filtering Log
Select Enable to log filtering events.
Select Disable not to log filtering events.