- Table of Contents
-
- 03-Monitor
- 01-Application analysis center
- 02-Blacklist logs
- 03-Single-packet attack logs
- 04-Scanning attack logs
- 05-Flood attack logs
- 06-WAF logs
- 07-Threat logs
- 08-Reputation logs
- 09-URL filtering logs
- 10-File filtering logs
- 11-Security policy logs
- 12-IPCAR logs
- 13-Sandbox logs
- 14-Terminal status
- 15-Application audit logs
- 16-System logs
- 17-Configuration logs
- 18-Traffic logs
- 19-TopN traffic
- 20-Security policy hit analysis
- 21-TopN threats
- 22-TopN URL filtering statistics
- 23-TopN file filtering statistics
- 24-Attack defense statistics
- 25-Connection rate ranking
- 26-TopN traffic trends
- 27-Security policy hit trend analysis
- 28-TopN threat trends
- 29-TopN URL filtering trends
- 30-TopN file filtering trends
- 31-Botnet analysis
- 32-Asset security
- 33-Threat case management
- 34-Report settings
- 35-Session list
- 36-User information center
- 37-IPv4 online users
- 38-IPv6 online users
- 39-MAC authentication online users
- 40-Terminal status
- Related Documents
-
14-Terminal status
Title | Size | Download |
---|---|---|
14-Terminal status | 13.11 KB |
Terminal logs
Introduction
Terminal identification logs
Terminal identification logs record detailed information about identified terminals, including terminal ID, IP address, access interface, and MAC address.
Traffic abnormality logs
Traffic abnormality logs are recorded when the highest bandwidth of a terminal is higher than the bandwidth upper limit or the lowest bandwidth is lower than the bandwidth lower limit during a one-minute interval.