80 CHAPTER 6: USING THE FIREWALL DIAGNOSTIC TOOLSThe Firewall logs the following events: Unauthorized connection attempts Blocked Web, FTP and Gopher sites, and blocked NNTP Newsgroups Blocked ActiveX and Java Blocked Cookies and Proxy attempts Attacks such as IP spoofing, Ping of Death, SYN flood Administrator logins Successful/unsuccessful loading of the Web Site FilterViewing the Log To view the log click Log and then select the View Log tab. A windowsimilar to that in Figure 34 displays.Figure 34 View Log WindowThe log is usually displayed as a list in a table, but may appear differentlydepending on the browser used. You may have to adjust the browser’sfont size and other viewing characteristics to display the log data mostefficiently. Depending on the browser, you can copy entries from the logand paste them into documents. Alternatively, use the E-mail Logfunction and review the log with an e-mail client rather than with a Webbrowser.Each log entry contains the date and time of the event, and a briefmessage describing the event. Some entries contain additionalDUA1611-0AAA02.book Page 80 Thursday, August 2, 2001 4:01 PM