7 firewall log, Figure 53 firewall: firewall logs, Table 38 firewall: url filter: domains filtering – ZyXEL Communications Prestige 794M User Manual

Page 76: Table 39 firewall: firewall logs

Advertising
background image

Prestige 794M User’s Guide

Chapter 6 Firewall

76

The following table describes the labels in this screen.

6.7 Firewall Log

Use the Firewall Log screen to set the Prestige to log firewall events (such as when an attack
is detected). View the event logs in the Event Log screen.

Click Configuration, Firewall and Firewall Log in the navigation panel to display the screen
as shown.

Figure 53 Firewall: Firewall Logs

The following table describes the labels in this screen.

Table 38 Firewall: URL Filter: Domains Filtering

LABEL

DESCRIPTION

Domain Name

Domain Name

Enter a domain name in this field.

Type

Specify whether to allow access (Trusted Domain) or deny access (Forbidden

Domain) from the drop-down list box.

Apply

Click Apply to add the keyword to the table below.

Trusted Domain

This read-only table lists the domains to which the Prestige allows access.

Name

This field displays the name of the filter rule.

Domain

This field displays the specified domain.

Forbidden Domain This read-only table lists the domains to which the Prestige blocks access.

Name

This field displays the name of the filter rule.

Domain

This field displays the specified domain.

Delete

Click Delete to remove the select keyword from this table.

Table 39 Firewall: Firewall Logs

LABEL

DESCRIPTION

Filtering Log

Select Enable to log filtering events.
Select Disable not to log filtering events.

Advertising