F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices System Management and Maintenance Configuration Guide-6PW100

98
Except that the user logs can be viewed at both the Web interface and the CLI, all other types of log
information can only be viewed in the Web interface.
224BDisplaying system logs
Select Log Report > Report > System Log from the navigation tree to enter the page as shown in 816HFigure
38.
817HTable 21 describes the configuration items.
Figure 38 Operation log configuration page
Table 21 Configuration items
Item Descri
p
tion
Time/Date
Time when the system log was generated.
Source
Module that generated the system log.
Level
Severity level of the system log. For more information about severity levels, see
818H
Table
22.
Description
Content of the system log.
Table 22 System log severity level
Severity level Description Value
Emergency
System is unusable.
0
Alert Information that demands prompt reaction.
1
Critical Critical information.
2
Error Error information.
3
Warning Warning information.
4
Notification Normal but significant information.
5