The user is blaming the firewall that faces the internet; analyzing the user's firewall logs can help troubleshoot the problem. Traffic entering and leaving the network is monitored by a firewall. A firewall is built to block connections from suspicious networks.
How the firewall controls different traffic types is documented by the logging feature. Users can utilize the logs to investigate an attack since they give users details like source and destination IP addresses, protocols, and port numbers.
Follow the link below to see the threats to which a firewall counters
https://brainly.com/question/25798879
#SPJ4