- Table of Contents
 - 
                        
- 07-System
 - 01-Hot backup
 - 02-VRRP
 - 03-Track
 - 04-BFD
 - 05-NQA
 - 06-Basic log settings
 - 07-Email server
 - 08-Session log settings
 - 09-NAT log settings
 - 10-AFT log settings
 - 11-Sandbox log settings
 - 12-Threat log settings
 - 13-Application audit log settings
 - 14-NetShare log settings
 - 15-URL filtering log settings
 - 16-Data filtering log settings
 - 17-Attack defense log settings
 - 18-Reputation log settings
 - 19-Bandwidth alarm logs
 - 20-Configuration log settings
 - 21-Security policy log
 - 22-File filtering log settings
 - 23-Terminal identification logging
 - 24-Heartbeat log settings
 - 25-WAF log settings
 - 26-IP access logs
 - 27-MAC access log
 - 28-Load balancing logging
 - 29-Bandwidth management logs
 - 30-Context rate limit logging
 - 31-Zero trust logs
 - 32-Report settings
 - 33-Session settings
 - 34-Signature upgrade
 - 35-Software upgrade
 - 36-License management
 - 37-IRF
 - 38-IRF advanced settings
 - 39-Contexts
 - 40-vSystems
 - 41-Administrators
 - 42-Date and time
 - 43-MAC address learning through a Layer 3 device
 - 44-SNMP
 - 45-Configuration management
 - 46-Reboot
 - 47-About
 - 48-Fast Internet Access
 - 49-Content moderation log settings
 - 50-Drop statistics
 - 51-License server
 
 
- Related Documents
 - 
                        
 
26-IP access logs
| Title | Size | Download | 
|---|---|---|
| 26-IP access logs | 78.84 KB | 
IP access logs
Introduction
With this feature enabled, the device will send to the log host the login and logout logs of users using IP authentication.

