
80 C
HAPTER
6: U
SING THE
F
IREWALL
D
IAGNOSTIC
T
OOLS
The Firewall logs the following events:
■
Unauthorized connection attempts
■
Blocked Web, FTP and Gopher sites, and blocked NNTP Newsgroups
■
Blocked ActiveX and Java
■
Blocked Cookies and Proxy attempts
■
Attacks such as IP spoofing, Ping of Death, SYN flood
■
Administrator logins
■
Successful/unsuccessful loading of the Web Site Filter
Viewing the Log To view the log click Log and then select the View Log tab. A window
similartothatinFigure34displays.
Figure 34
View Log Window
The log is usually displayed as a list in a table, but may appear differently
depending on the browser used. You may have to adjust the browser’s
font size and other viewing characteristics to display the log data most
efficiently. Depending on the browser, you can copy entries from the log
and paste them into documents. Alternatively, use the E-mail Log
function and review the log with an e-mail client rather than with a Web
browser.
Each log entry contains the date and time of the event, and a brief
message describing the event. Some entries contain additional
DUA1611-0AAA02.book Page 80 Thursday, August 2, 2001 4:01 PM
Komentáře k této Příručce