Security Configuration
Logs
The Logs record various types of activity on the TW100-BRV304. This data is useful for
troubleshooting, but enabling all logs will generate a large amount of data and adversely affect
performance.
Since only a limited amount of log data can be stored in the TW100-BRV304, log data can
also be E-mailed to your PC or sent to a Syslog Server.
Figure 40: Logs Screen
Data - Logs Screen
Enable Logs
Incoming Traffic
Select the desired option:
•
All IP traffic
- this will log all incoming TCP/IP connections, of
any type. This will generate the largest logs, and fill the internal
log buffer more quickly.
•
All TCP/UDP/ICMP traffic
- These 3 protocols are used by most
internet traffic. TCP is used by HTTP, FTP, Telnet, E-mail and
other common Internet protocols and applications. UDP is used by
Video streams and other communications where speed is more im-
portant than guaranteed delivery. ICMP is used by the "ping" and
"trace route" applications, and other network diagnostics.
65
Summary of Contents for TW100-BRV304 SHEETS
Page 1: ......
Page 2: ......
Page 27: ...PC Configuration Figure 15 Windows NT4 0 DNS 23...
Page 63: ...Security Configuration 59...
Page 149: ...Appendix B Specifications 145...