DEV Community

FLO
FLO

Posted on

Analyzing Firewall Logs


In this video, I was able to:

- Generate Traffic to the Firewall

using a script on puTTY configuration window, I was able to load and open the traffic-generator and type in sh /tg/malware.sh. Which is able to generate test malware traffic to the Firewall so that you're able to see the malware traffic in the Firewall.

- Review Traffic in the Firewall Log
noticing the traffic from the firewall by clicking on monitor. You are able to notice the traffic under the Application column and see the traffic that is categorized as web-browsing. Also you can review the Detailed Log View window to see the source, destination.

Top comments (0)