Compex WP54AG User Manual
Page 170
                                    Advertising
                                    
                                        
                                    
                                
                                 
159
F
F
I
I
R
R
E
E
W
W
A
A
L
L
L
L
L
L
O
O
G
G
S
S
When the access point’s SPI firewall is in operation, valuable traffic patterns in 
your network will be captured and stored into the Firewall Logs. From these logs, 
you can extract detailed information about the type of data traffic, the time, 
the source and destination address/port as well as the action taken by the SPI 
firewall. You can choose which type of packets to log from the Firewall 
Configuration
.
T
T
O
O
V
V
I
I
E
E
W
W
F
F
I
I
R
R
E
E
W
W
A
A
L
L
L
L
L
L
O
O
G
G
S
S
Step 1:
Under the
S
S
E
E
C
C
U
U
R
R
I
I
T
T
Y
Y
C
C
O
O
N
N
F
F
I
I
G
G
U
U
R
R
A
A
T
T
I
I
O
O
N
N
command menu, click on
F
F
i
i
r
r
e
e
w
w
a
a
l
l
l
l
L
L
o
o
g
g
s
s
.
Step 2:
Click the
R
R
e
e
f
f
r
r
e
e
s
s
h
h
button to see new
information captured in the log.
                                    Advertising