Log storage format
You can see the fields of the logs the Firewall engine maintains in the table below. If some fields that can be saved to the log file are not selected in the settings, they will not be displayed in the log file.
||The name of the computer with ReaSoft Network Firewall. This is the computer name that is assigned in Windows.
||The date that the logged event occurred, according to the date set on the ReaSoft Network Firewall computer.
||The time that the logged event occurred, according to the time set on the ReaSoft Network Firewall computer.
||The transport protocol used for the connection.
||Source IP and Port
||The IP address and port of the requesting client.
||Destination IP and Port
||The network IP address and port for the remote computer that provides service to the current connection.
||Original Source IP
||The IP address of the client without port.
||The name of the network from which the request originated.
||The name of the network that provides service for the current request.
||This field indicates status of the connection. Established, Intermediate or Closed.
||This field indicates the action taken by the firewall engine. Allow, Deny or Redirect.
||The rule name that either allowed or denied access to the request.
||The name of the application protocol based on the protocol definitions.
||The number of bytes sent from the source client to the destination server.
||The number of bytes sent from the destination computer and received by the client.
||Source Host Name
||Host name of client.
||Destination Host Name
||Host name of destination server.
||The account of the user making the request as defined in ReaSoft Network Firewall.
||This identifies a connection ID.
affordable and business-ready solutions
For fastest service you can purchase ReaSoft Network Firewall from our secure online store:
Online help file
ReaSoft Network Firewall additional info
product updates, new releases