Netgear WNR854T WNR854T Reference Manual - Page 39

Viewing Logs of Web Access or Attempted Web Access, Date and Time

Page 39 highlights

RangeMax NEXT Wireless Router Model WNR854T Reference Manual Viewing Logs of Web Access or Attempted Web Access The log is a detailed record of what Web sites you have accessed or attempted to access. Up to 128 entries are stored in the log. Log entries will only appear when keyword blocking is enabled, and no log entries will be made for the Trusted User. An example is shown below: Figure 3-5 Log entries are described in Table 3-1. Table 3-1. Log entry descriptions Field Date and Time Source IP Action Target URL Description The date and time the log entry was recorded. The IP address of the initiating device for this log entry. This field displays whether the access was blocked or allowed. The name or IP address of the Web site or newsgroup visited or attempted to access. Content Filtering 3-7 v1.0, 2006-04

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90

RangeMax NEXT Wireless Router Model WNR854T Reference Manual
Content Filtering
3-7
v1.0, 2006-04
Viewing Logs of Web Access or Attempted Web Access
The log is a detailed record of what Web sites you have accessed or attempted to access. Up to 128
entries are stored in the log. Log entries will only appear when keyword blocking is enabled, and
no log entries will be made for the Trusted User. An example is shown below:
Log entries are described in
Table 3-1
.
Figure 3-5
Table 3-1. Log entry descriptions
Field
Description
Date and Time
The date and time the log entry was recorded.
Source IP
The IP address of the initiating device for this log entry.
Action
This field displays whether the access was blocked or allowed.
Target URL
The name or IP address of the Web site or newsgroup visited or
attempted to access.