Firewall logs record network activity based on predefined security rules. They help you monitor and troubleshoot connectivity and security issues by showing:

  • Access attempts — both successful and blocked
  • Source and destination addresses — where traffic originates and where it’s going
  • Protocols — such as TCP, UDP, HTTP, or HTTPS
  • Port numbers — used to identify specific services or endpoints

Use firewall logs to detect suspicious activity, investigate access issues, and strengthen your network’s security posture.

What you can do on the Firewall logs page

You can: