Netgear FWG114P v2 사용자 설명서

다운로드
페이지 296
Reference Manual for the ProSafe Wireless 802.11g  Firewall/Print Server Model FWG114P v2
Firewall Protection and Content Filtering
6-17
201-10301-02, May 2005
Log action buttons are described in 
What to Include in the Event Log
Use these checkboxes to determine which events are included in the log. Checking all options will 
increase the size of the log, so it is good practice to disable any events which are not really 
required. 
All Websites and news groups visited - If checked, all visited websites and newsgroups are 
logged. 
All Incoming TCP/UDP/ICMP traffic - If checked, all incoming TCP/UDP/ICMP connections 
and traffic is logged. 
All Outgoing TCP/UDP/ICMP traffic - If checked, all outgoing TCP/UDP/ICMP connections 
and traffic is logged. 
Other IP traffic - If checked, all other traffic (IP packets which are not TCP, UDP, or ICMP) is 
logged. 
Router operation (start up, get time, etc.) - If checked, Router operations, such as starting up 
and getting the time from the Internet Time Server, are logged. 
Connection to the Web-based interface of this Router - If checked, Administrator connections 
to the Web-based interface will be logged. 
Other connections and traffic to this Router - If checked, this will log traffic sent to this Router 
(rather than through this Router to the Internet). 
Allow duplicate log entries - If checked, then events or packets which fall within more than 
one (1) category above will have a log entry for each category in which they belong. This will 
generate a large number of log entries. If unchecked, then events or packets will only be 
logged once. Usually, this should be left unchecked. 
Logging programs are available for Windows, Macintosh, and Linux computers.
Table 6-1.
Log action buttons
Field
Description
Refresh
Refreshes the log screen.
Clear Log
Clears the log entries.
Send Log
E-mails the log immediately.