Use the firewall log, View firewall logs – Teletronics EZStation5 User Manual
Page 156

Page 156
Use the Firewall Log
The Firewall Log captures and stores network traffic information such as
the type of data traffic, the time, the source and destination address /
port, as well as the action taken by the firewall.
View Firewall Logs
Step 1:
Select
F
F
i
i
r
r
e
e
w
w
a
a
l
l
l
l
L
L
o
o
g
g
from the
S
S
E
E
C
C
U
U
R
R
I
I
T
T
Y
Y
C
C
O
O
N
N
F
F
I
I
G
G
U
U
R
R
A
A
T
T
I
I
O
O
N
N
command menu.
Step 2:
Click on the
R
R
e
e
f
f
r
r
e
e
s
s
h
h
button to see the
information captured in the log:
Time
at which the packet was detected
by the firewall.
Action
, which states whether the packet
was accepted or denied.
Protocol
type of the packet.
Source Address
from which the packet
originated
Destination Address
to which the packet
was intended.
Source Port
from which the packet was
initiated.
Destination Port
to which the packet was
meant for.
Any
Information
.