of the attack
Protocol used for the
attack.
tcp
,
udp
, or
icmp
tcp
5 bytes
Port range of the
attack
port to port
2765 to 27702
Viewing and maintaining logs
From the web-based manager you can view, search, and maintain traffic, event, and attack logs.
•
•
•
Downloading a log file to the management computer
•
Deleting all of the messages in an active log
•
Viewing logs
Use the following procedure to view and search the active traffic, event, or attack log. You can view and
search the current log or any saved log files.
•
Go to
Log&Report > Logging
.
•
Click
Traffic Log
,
Event Log
, or
Attack Log
to select the type of log to view.
The web-based manager lists all of the saved logs of the selected type with the active log at the top of
the list. For each log, the list shows the date and time at which an entry was last added to the log, the
size of the log file, and its name.
Sample Traffic log list:
•
To view the active log or a saved log file, click View
.
•
The web-based manager displays the messages in the selected log.
Sample Event Log messages:
DFL-1000 User’s Manual
88