Description
Field
Shows the
firewall services
to which this traffic
matched.
Services
The
IP address
of the remote computer.
Remote address
The
port
on the remote computer.
Remote port
The
IP address
of your own computer.
Local address
The
port
on your own computer.
Local port
View the action log
If a program, such as a network game, does not work, you can check in the action log if application control
has denied the program from connecting to the Internet.
The
action log
is a text file (
action.log
) that automatically collects information about the network
connections. The maximum size of the file is 10 MB. After the file becomes full, the old log entries are deleted.
To view the
action log
:
1.
On the main page, click
Settings
.
2.
Select
Network connections
➤
Logging
.
3.
Click
Show action log
.
The
action log
opens in a default text editor or viewer, for example, Notepad.
Monitor network traffic with packet logging
You can start packet logging if you want to gather information about the
IP
network traffic.
How does packet logging work
The
packet log
collects information about the
IP
network traffic.
By default, the packet logging is turned off. Packet logging is mainly aimed at experienced users who are
familiar with computer networks.
You can turn the packet logging on if you have created your own set of
firewall rules
, and want to check
how they block traffic. You can also do this if you suspect malicious network activity.
Information is gathered into 10 files (
packetlog.0-packetlog.9
). Each time you turn on the logging,
the
packet log
is collected into a new file. After the tenth file becomes full, the next log is collected again to
the first file. In this way, you can view the previous logs while a new log is generated.
In addition to the
IP
traffic, the
packet log
also collects information about other types of network traffic, for
example, about the
protocols
needed by your
Local Area Network
(LAN). This information includes, for
example,
routing
information.
The
packet log
is in
hexadecimal
format and supports
tcpdump
format. This allows you to open the log
files also in a packet logging program other than the default
packet log
viewer. You can also use a network
protocol
analyzer program to analyze the contents further.
Start packet logging
You can start packet logging if you suspect malicious network activity, or for example, a network game stops
working.
To start logging:
1.
On the main page, click
Settings
.
2.
Select
Network connections
➤
Logging
.
F-Secure Client Security | Local host operations |
125
Summary of Contents for ANTI-VIRUS FOR MICROSOFT EXCHANGE 9.00
Page 1: ...F Secure Client Security Administrator s Guide...
Page 2: ......
Page 8: ...8 F Secure Client Security TOC...
Page 44: ......
Page 62: ......
Page 86: ......
Page 114: ......
Page 118: ......
Page 135: ...Tammasaarenkatu 7 PL 24 00181 Helsinki Finland F Secure Client Security Virus information 135...
Page 148: ......
Page 158: ......