Motorola SBG-940 User Guide - Page 45

Firewall > LOGS - user manual

Page 45 highlights

Overview Installation Troubleshooting Contact FAQ Specifications Glossary License Configuration: Basic Gateway TCP/IP Wireless USB Firewall > LOGS Page You can use this page to set which firewall events are logged. Firewall > LOGS page fields Field or Button Description Enable Session Log Enable Blocking Log Enable Intrusion Log Apply Select this box to log every data session from the private LAN that was authorized by the SBG940 firewall. Usually, the session log displays a history of normal data traffic. It also lists the start of sessions the firewall terminated because: • The policy was changed • They were eventually determined to be an intrusion or attack To display the session log, click session. Select this box to log inbound and outbound packets that the SBG940 firewall: • Does not allow to pass because they use protocols and/or ports not explicitly allowed by the active policy • Determines to be invalid because of a session or reassembly timeout To display the blocking log, click blocking. Select this box to log attacks using common network intrusion tactics that the SBG940 firewall detects and stops. To display the intrusion log, click intrusion. Click to apply your changes. If you enable the firewall, the blacklist log is always generated. Any IP address the firewall determines to have breached the active policy is added to the blacklist log. To view the blacklist log, click blacklist. The firewall blocks all traffic to and from a blacklisted IP address for 24 hours or until you reboot the SBG940 or manually clear the blacklist by clicking Clear on the Firewall > LOGS - blacklist page. SBG940 User Guide 37

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141

Overview
Installation
Troubleshooting
Contact
FAQ
Specifications
Glossary
License
Configuration:
Basic
Gateway
TCP/IP
Wireless
USB
SBG940 User Guide
37
Firewall > LOGS Page
You can use this page to set which firewall events are logged.
If you enable the firewall, the blacklist log is always generated. Any IP address the firewall determines to have
breached the active policy is added to the blacklist log. To view the blacklist log, click
blacklist
. The firewall blocks
all traffic to and from a blacklisted IP address for 24 hours or until you reboot the SBG940 or manually clear the
blacklist by clicking
Clear
on the Firewall > LOGS — blacklist page.
Firewall > LOGS page fields
Field or Button
Description
Enable Session Log
Select this box to log every data session from the private LAN that was authorized by the
SBG940 firewall. Usually, the session log displays a history of normal data traffic. It also lists
the start of sessions the firewall terminated because:
The policy was changed
They were eventually determined to be an intrusion or attack
To display the session log, click
session
.
Enable Blocking Log
Select this box to log inbound and outbound packets that the SBG940 firewall:
Does not allow to pass because they use protocols and/or ports not explicitly allowed by
the active policy
Determines to be invalid because of a session or reassembly timeout
To display the blocking log, click
blocking
.
Enable Intrusion Log
Select this box to log attacks using common network intrusion tactics that the SBG940 firewall
detects and stops.
To display the intrusion log, click
intrusion
.
Apply
Click to apply your changes.