DFL-900/1500 User Manual
28.1 Demands
1.
The System Administrator wants to know all the actions of administration in the past. So it can avoid illegal system
administration.
2.
The System Administrator needs to check the logs of VPN, IDS, Firewall, and Content Filter everyday. But he / she feels
inconvient to verify the DFL-1500 logs. He / She hopes to decrease the checking procedure.
28.2 Objectives
1.
The System Administrator wants to know all actions of administration in the past.
2.
The System administrator would like to view the daily log report of DFL-1500.
28.3 Methods
1.
Through tracking the system logs, you can distinguish which administrated action is valid or not.
Use the syslog server to receive mail, or edit the "Mail Logs" page of DFL-1500. Make the log mailed out automatically
2.
every periodic time.
28.4 Steps
28.4.1 System Logs
Step 1.
View System Logs
All the system administrated actions will be log in
this page.
For the detailed information of System Logs,
please refer Appendix D.
FIELD
NO
Time
Source-IP
Access--Info
DEVICE STATUS > System Logs
DESCRIPTION
system logs sequence number
The time which is occurred by the specified system event.
A type of the specified system events.
The description of the system log. Include Component Type, Log ID, Log Description
and Event ID (optional).
Table 28-1 System log description
225
Chapter 28
Log System
Chapter 28
Log System