User's Manual

Administrator’s Handbook
38
Firewall Log
When you click Firewall Log, the Firewall Log page appears.
The Gateway detects security related events including common types of malicious attacks and writes them to a
dedicated Firewall log file. You view this log file from either:
Motorola Netopia
®
Web interface
Text-based command line interface using telnet
The log provides information useful in identifying a specific type of attack and tracing its origin. The log maintains
100 entries, and requires a manual reset once full. This preserves for troubleshooting purposes the acquired infor-
mation about specific attacks, their frequency and tracing information.