User's Manual Part 2

Viewing the Event Log
190 Check Point Safe@Office User Guide
An event marked in
this color…
Indicates…
Green Traffic accepted by the firewall.
By default, accepted traffic is not logged.
However, such traffic may be logged if specified by a security policy
downloaded from your Service Center, or if specified in user-defined
rules.
You can create firewall rules specifying that certain types of connections should be
logged, whether the connections are incoming or outgoing, blocked or accepted.
For information, see Using Rules on page 211.
The logs detail the date and the time the event occurred, and its type. If the event is
a communication attempt that was rejected by the firewall, the event details include
the source and destination IP address, the destination port, and the protocol used for
the communication attempt (for example, TCP or UDP). If the event is a
connection made or attempted over a VPN tunnel, the event is marked by a lock
icon in the VPN column.
This information is useful for troubleshooting. You can export the logs to an *.xls
(Microsoft Excel) file, and then store it for analysis purposes or send it to technical
support.
Note: You can configure the Safe@Office appliance to send event logs to a Syslog
server. For information, see Configuring Syslog Logging on page 388.