There are three (3) buttons
Refresh - Update the log data.
Clear Log - Clear the log, and restart it. This makes
new messages easier to read.
Send Log - E-mail the log immediately. This is only
functional if the E-mail screen has been configured.
Use these checkboxes to determine which events are
included in the log. Checking all options will increase the
size of the log, so it is good practice to disable any events
which are not really required.
Attempted access to blocked sites - If checked,
attempted Internet accesses which were blocked are
logged.
Connections to the Web-based interface of this
Router - If checked, this will log connections TO this
Router, rather than through this Router to the Internet.
Router operation - If checked, other Router operations
(not covered by the selections above) will be logged.
Known DoS attacks and Port Scans - If checked,
Denial of Service attacks, as well as port scans, will be
logged.
Outgoing (Internet) connections - If checked, the
outgoing Internet connections are logged.
Access Control - If enabled, the log will include at-
tempted outgoing connections which have been blocked
by the "Access Control" feature.
If your Syslog server has a fixed IP address, select this
option, and enter the IP address of your Syslog server.