77
Safety
Getting
Started
Battery
Installation
Installation
Wireless
Configuration
Ethernet
Configuration
Usage
Troubleshooting
Glossary
Touchstone WTM652 Telephony Modem User’s Guide
Viewing the Security Log
The security log keeps a list of system- and firewall-related events. You can use the
security log to troubleshoot connectivity problems and to view possible intrusion at-
tempts.
To view the security log, choose Firewall from the navigation menu and then Se cu-
rity Log.
Click the
Refresh
button to update the listing. Click the
Save
button to download
the current log to your computer (the file is named
log_web.txt
). Click the button
to clear both the system and firewall logs.
Note
:
You may have to scroll down to access the buttons.