Instruction Manual Wireless Broadband Router
Fig 35
Note: For security, it is strongly recommend that you change the
initial user name and password.
3.11.8 System Log
You can find the system record here and check whether there is network
attack.
Fig 36
Clear Log: To delete System log info.
35