Log settings

The firewall provides extensive logging capabilities for traffic, system, and network protection functions. You can use logs to analyze network activity to help identify security issues and reduce network abuse. You can store logs locally or send them to syslog servers. The firewall supports syslog as defined in RFC 5424.

  • To store logs locally, select Local and then select logs.
  • To send logs to a syslog server, click Add and specify server details. Then, select logs.

Logs

Firewall
Firewall logs provide information about traffic associated with the firewall configuration such as firewall rules, MAC filtering, and DoS attacks.
IPS
IPS logs provide records of detected and dropped attacks based on unknown or suspicious patterns (anomalies) and signatures.
Anti-virus
Anti-virus logs provide details of viruses detected in HTTP, SMTP, FTP, POP3, IMAP4, HTTPS, SMTPS, IMAPS and POPS traffic.
Anti-spam
Anti-spam logs provide details about SMTP, POP3, IMAP4, SMTPS, POPS, IMAPS spam and probable spam mails.
Content filtering
Content filtering logs provide details about web and application filtering events such as those associated with web policies.
Note To view events associated with a web policy, you must select Log firewall traffic in the associated firewall rule.
Events
Event logs provide information about configuration activities, authentication activities, and system activities.
Web server protection
Web server protection logs provide details of web server protection activities, for example, protection policies.
Advanced threat protection
Advanced threat protection logs provide information about ATP events such as drops or alerts.
Wireless
Wireless logs provide details about access point activity and SSIDs.
Heartbeat
Heartbeat logs provide information about the health status of the endpoints.
System health
System health logs provide details of CPU usage, memory usage, number of live users, interfaces, and disk partitions.
Sandstorm
Sandstorm logs provide records of all Sandstorm events.