Reference Manual for the ProSafe VPN Firewall FVS114
4-18
Firewall Protection and Content Filtering
202-10098-01, April 2005
Log entries are described in
Table 4-1
Log action buttons are described in
Table 4-2
Syslog
You can configure the firewall to send system logs to an external PC that is running a syslog
logging program. Enter the IP address of the logging PC and click the
Enable Syslog
check box.
Logging programs are available for Windows, Macintosh, and Linux computers.
Table 4-1.
Log entry descriptions
Field
Description
Date and Time
The date and time the log entry was recorded.
Description or
Action
The type of event and what action was taken if any.
Source IP
The IP address of the initiating device for this log entry.
Source port and
interface
The service port number of the initiating device, and whether it
originated from the LAN or WAN.
Destination
The name or IP address of the destination device or Web site.
Destination port and
interface
The service port number of the destination device, and whether it’s on
the LAN or WAN.
Table 4-2.
Log action buttons
Button
Description
Refresh
Refresh the log screen.
Clear Log
Clear the log entries.
Send Log
Email the log immediately.