This help contains the following topics:
The
When configuring an IPS profile or anti-virus profile, you can enable the logging function. The IPS module and anti-virus module can then generate logs for matching packets.
Support of non-default vSystems for this feature depends on the device model. This feature is available on the Web interface only if it is supported.
To use IPS, you must purchase and install the required license. After the license expires, the IPS feature is available through the existing IPS signature library, but you cannot update the IPS signature library to the version on the official website released after the license expires. For more information about licensing, see the license management help.
To use anti-virus, you must purchase and install the required license. After the license expires, the anti-virus feature is available through the existing anti-virus signature library, but you cannot update the virus signature library or use the cloud query function. For more information about licensing, see the license management help.
Only one log operation (import, export, or clear) is allowed at a time.
Only one user can perform a log operation at a time. When you import, export, or clear logs, make sure no one else is performing a log operation.
When querying logs of a time range, this page displays the logs of the first day by default. You can click
For anti-virus logs, threat ID 4294967295 indicates that the virus was detected by cloud query.
For IPS logs, threat ID 4294967290 indicates that the attack was detected by semantic analysis.
To view details of a log, click the in the
Hover over the content.
Click
After the intrusion prevention system executes the packet capture action, the device generates logs. With hard disks or USB disks installed, you can click
If false alarms exist in the threat logs, you can click the of a log to add the detected IPS signature ID and URL to the whitelist. The whitelist feature permits packets matching the whitelist to pass through, reducing false alarms.
Click the
In the navigation pane, select
Click
In the dialog box that opens, click
Select a log file, and enter the password for the log file. The password was set when the file was exported.
Click the
In the navigation pane, select
Click on a column header, specify the search criteria to display the logs to be exported, and then click
Click
On the page that opens, configure the log export settings.
Table-1 Log export configuration items
Item | Description |
Set password | Enter a password for encrypting the log files. This password is required when you view or import the exported log files. |
Logs per file | Specify the maximum number of logs allowed in a single log file.
|
Click
Perform this task to enable log aggregation. Log aggregation reduces the number of log entries displayed on the Web interface and facilitates you to view the logs. With log aggregation enabled, the device aggregates service logs that meet the same aggregation criteria at configured intervals. The log aggregation criteria include source IP address, destination IP address, application, source port, destination port, threat ID, threat name, and service type.
Click the
In the navigation pane, select
Click the
On the page that opens, enable the log aggregation feature and configure the aggregation interval.
Click