Browse log data
You can browse log data on the Logs tab.
Steps
Example
Option | Definition |
---|---|
Kind | The type of policy that triggered the log event. |
Creation Time | Log entry creation time. |
Component ID | The identifier of the creator of the log entry. |
Event ID | Event identifier, unique within one sender. |
Sender | IP address of the NGFW Engine that sent the log entry. |
Information Message | A description of the log event that further explains the entry. |
Facility | The NGFW Engine subsystem that generated the log event. |
Type | Log entry severity type. |
Action | Action of the rule that triggered the log event. The action values are Allow, Discard, Refuse, Terminate, Wait for further actions, and Wait for authentication. |
Rule Tag | Rule tag of the rule that triggered the log event. |
Src Addr | Packet source IP address. |
Dst Addr | Packet destination IP address. |
Src Port | TCP or UDP source port in the packet header. |
Dst Port | TCP or UDP destination port in the packet header. |
IP Protocol | IP protocol of the traffic that generated the log event. |
IP Version | Version field value in the IP header. |
Event | The event that triggered the log creation, for example, New connection, Connection closed, Connection discarded. |
Situation | The identifier of the situation that triggered the log event. |
Syslog | Syslog is a system service used in some operating systems, for example, UNIX, and software packages. For more information about syslog and syslog types, see RFC 3164. |
Daemon | The name of the daemon that generated the log event. |