Troubleshooting
Tracking Traffic
TOOLS > Log Settings > Logs Configuration
The LOGS CONFIGURATION page lets you select the type of traffic passing through the
wireless controller that you want to log for display in Syslog, E-mailed logs, or the Event
Viewer. This page helps you capture suspicious activity such as denial-of-service attacks,
general attack information, login attempts, dropped packets, and similar events. Traffic
through each network segment (LAN, Option, and DMZ) can be tracked based on whether
the packet was accepted or dropped by the firewall.
The following table describes the logging options.
221
DWC-1000 Wireless Controller User's Guide