Mon. Jan 23rd, 2023

Events and log entries

Firewalls are able to maintain a log of activity. This could include the source and destination of data packets, the date and time, and the protocol used.

Logs are invaluable in the event of attack, as a tool to verify that firewall rules are operating as intended, to identify malicious activity originating on your network, and for identification of potential DOS attacks.

This page discusses firewall event and log entries in detail: The Significance and Role of Firewall logs (