D-Link DFL-300 User Manual - Page 150

Log, The FIREWALL VPN ROUTER Office Firewall supports traffic logging - vpn setup

Page 150 highlights

Log The FIREWALL VPN ROUTER Office Firewall supports traffic logging and event logging to monitor and record services, connection times, and the source and destination network address. The Administrator may also download the log files for backup purposes. The Administrator mainly uses the Log menu to monitor the traffic passing through the FIREWALL VPN ROUTER Firewall. What is Log? Log records all connections that pass through the Firewall's control policies. Traffic log's parameters are setup when setting up control policies. Traffic logs record the details of packets such as the start and stop time of connection, the duration of connection, the source address, the destination address and services requested, for each control policy. Event logs record the contents of System Configuration changes made by the Administrator such as the time of change, settings that change, the IP address used to log on, etc. How to use the Log The Administrator can use the log data to monitor and manage the FIREWALL VPN ROUTER and the networks. The Administrator can view the logged data to evaluate and troubleshoot the network, such as pinpointing the source of traffic congestions. - 150 -

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179

- 150 -
Log
The FIREWALL VPN ROUTER Office Firewall supports traffic logging and
event logging to monitor and record services, connection times, and the
source and destination network address.
The Administrator may also
download the log files for backup purposes. The Administrator mainly uses
the Log menu to monitor the traffic passing through the FIREWALL VPN
ROUTER Firewall.
What is Log?
Log records all connections that pass through the Firewall’s control policies.
Traffic log’s parameters are setup when setting up control policies. Traffic
logs record the details of packets such as the start and stop time of
connection, the duration of connection, the source address, the destination
address and services requested, for each control policy. Event logs record
the contents of System Configuration changes made by the Administrator
such as the time of change, settings that change, the IP address used to log
on, etc.
How to use the Log
The Administrator can use the log data to monitor and manage the
FIREWALL VPN ROUTER and the networks.
The Administrator can view
the logged data to evaluate and troubleshoot the network, such as
pinpointing the source of traffic congestions
.