How to get Event, Data and Firewall Logs from AP86** model ?
Path: Logs > Events
By default, the log displays all events recorded during the last two days, starting with the latest
Additionally, the log records any event that sends an SNMP trap, except SNMP authentication
failures, and abnormal internal system events.
You can enable color coding for events on the Configuration > Security > Local Users
Management screen.Path: Logs > Events > Log
By default, the event log displays the most recent events first. To see the events listed together on a
Web page, click Launch Log in New Window.
To open the log in a text file or to save the log to disk, click on the floppy disk icon( ) on the same
line as the Event Log heading.
You can also use FTP or Secure CoPy (SCP) to view the event log. See “Use FTP or SCP to retrieve
log files” on page 134.
Filtering event logs. Use filtering to omit information you don’t want to display.
• Filtering the log by date or time: Use the Last or From radio buttons. (The filter
configuration is saved until the RPDU restarts.)
• Filtering the log by event severity or category:
– Click Filter Log.
– Clear a check box to remove it from view.
– After you click Apply, text at the upper right corner of the Event Log page indicates
that a filter is active. The filter is active until you clear it or until the RPDU restarts.
• Removing an active filter:
– Click Filter Log.
– Click Clear Filter (Show All).
– As Administrator, click Save As Default to save this filter as the new default log view
for all users.
Important points on filtering:• Events are processed through the filter using OR logic. If you apply a filter, it works
regardless of the other filters.
• Events that you cleared in the Filter By Severity list never display in the filtered Event
Log, even if selected in the Filter by Category list.
• Similarly, events that you clear in the Filter by Category list never display in the filtered
Deleting event logs. To delete all events, click Clear Log. Deleted events cannot be retrieved.
To disable the logging of events based on their assigned severity level or their event category, see
“Configure event actions” on page 118
Path: Logs > Events > Reverse Lookup
With reverse lookup enabled, when a network-related event occurs, both the IP address and the
domain name for the networked device with the event are logged in the event log. If no domain name
entry exists for the device, only its IP address is logged with the event.
Since domain names generally change less frequently than IP addresses, enabling reverse lookup
can improve the ability to identify addresses of networked devices that are causing events.
Reverse lookup is disabled by default. You should not need to enable it if you have no DNS server
configured or have poor network performance because of heavy network traffic.
Path: Logs > Events > Size
Use Event Log Size to specify the maximum number of log entries.
Note: When you resize the event log in order to specify a maximum size, all existing log entries are
deleted. When the log subsequently reaches the maximum size, the older entries are deleted.