DG834G Reference Manual
An example of the logs file is shown below.
Figure 6-8
Log entries are described in
Table 6-1.
Security Log entry descriptions
Field
Description
Date and Time
The date and time the log entry was recorded.
6-10
Table 6-1
below:
v3.0, September 2005
Managing Your Network