Netgear WGT624v4 WGT624v4 Reference Manual - Page 54

Viewing Logs of Web Access or Attempted Web Access, Table 3-1. Log Entry Descriptions

Page 54 highlights

108 Mbps Wireless Router WGT624 v4 Reference Manual Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of which websites you have accessed or attempted to access. Up to 128 entries are stored in the log. Log entries will appear only when keyword blocking is enabled, and no log entries will be made for the trusted user. An example is shown below: Figure 3-6 Log entries are described in Table 3-1, and Log action buttons are described in Table 3-2. Table 3-1. Log Entry Descriptions Field Action Destination IP Source IP Date and Time Description This field displays whether the access was blocked or allowed. The name or IP address of the website or newsgroup that you visited or attempted to access. The IP address of the initiating device for this log entry. The date and time the log entry was recorded. Table 3-2. Log Action Buttons Field Refresh Clear Log Send Log Description Click this button to refresh the log screen. Click this button to clear the log entries. Click this button to email the log immediately. 3-8 v1.0, May 2007 Content Filtering

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96

108 Mbps Wireless Router WGT624 v4 Reference Manual
3-8
Content Filtering
v1.0, May 2007
Viewing Logs of Web Access or Attempted Web Access
The log is a detailed record of which websites you have accessed or attempted to access. Up to 128
entries are stored in the log. Log entries will appear only when keyword blocking is enabled, and
no log entries will be made for the trusted user. An example is shown below:
Log entries are described in
Table 3-1
, and Log action buttons are described in
Table 3-2
.
Figure 3-6
Table 3-1. Log Entry Descriptions
Field
Description
Action
This field displays whether the access was blocked or allowed.
Destination IP
The name or IP address of the website or newsgroup that you visited or
attempted to access.
Source IP
The IP address of the initiating device for this log entry.
Date and Time
The date and time the log entry was recorded.
Table 3-2. Log Action Buttons
Field
Description
Refresh
Click this button to refresh the log screen.
Clear Log
Click this button to clear the log entries.
Send Log
Click this button to email the log immediately.