of the various network devices and their role in network security. Discuss how critical log of the various network devices and their role in network security. Discuss how critical log