System records various system logs, including event logs, alarm logs, security logs, IPS logs, configuration logs, network logs, NBC logs, traffic logs and debug logs.
The log function is a tool to show device operation status, providing evidence for you to analyze the network and protect against network attacks.
Both event logs and alarm logs categorize system events by severities. The eight severities are described as follows:
Severity | No. | Description | Log Definition |
---|---|---|---|
Emergencies | 0 | Identifies invalid system events. | LOG_EMERG |
Alerts | 1 | Identifies problems which need immediate attention such as device is being attacked. | LOG_ALERT |
Critical | 2 | Identifies urgent problems, such as hardware failure. | LOG_CRIT |
Errors | 3 | Generates messages for system errors. | LOG_ERR |
Warnings | 4 | Generates messages for warning. | LOG_WARNING |
Notifications | 5 | Generates messages for notice and special attention. | LOG_NOTICE |
Informational | 6 | Generates informational messages. | LOG_INFO |
Debugging | 7 | Generates all debugging messages, including daily operatiol messages. | LOG_DEBUG |
Log files can be sent to the following destinations:
To facilitate the access and analysis of the system logs, logs follow a fixed pattern of information layout, i.e. date/time, severity level@module: descriptions. See the example below:
2000-02-05 01:51:21, WARNING@LOGIN: Admin user "admin" logged in through console from localhost.
Related Topics:
To view log messages: Event Log List Alarm Log List Security Log List IPS Log List Configuration Log List Network Log List NBC Log List Session Log List NAT Log List Web Surfing Log List