Introduction to Log

System records various system logs, including event logs, alarm logs, security logs, IPS logs, configuration logs, network logs, NBC logs, traffic logs and debug logs.

The log function is a tool to show device operation status, providing evidence for you to analyze the network and protect against network attacks.

Log Severity

Both event logs and alarm logs categorize system events by severities. The eight severities are described as follows:

Severity No. Description Log Definition
Emergencies 0 Identifies invalid system events. LOG_EMERG
Alerts 1 Identifies problems which need immediate attention such as device is being attacked. LOG_ALERT
Critical 2 Identifies urgent problems, such as hardware failure. LOG_CRIT
Errors 3 Generates messages for system errors. LOG_ERR
Warnings 4 Generates messages for warning. LOG_WARNING
Notifications 5 Generates messages for notice and special attention. LOG_NOTICE
Informational 6 Generates informational messages. LOG_INFO
Debugging 7 Generates all debugging messages, including daily operatiol messages. LOG_DEBUG

Export Destinations

Log files can be sent to the following destinations:

Log Format

To facilitate the access and analysis of the system logs, logs follow a fixed pattern of information layout, i.e. date/time, severity level@module: descriptions. See the example below:

2000-02-05 01:51:21, WARNING@LOGIN: Admin user "admin" logged in through console from localhost.