F3726, F3211, F3174, R5135, R3816-HP Firewalls and UTM Devices System Management and Maintenance Configuration Guide-6PW100
101
Figure 41 Blacklist log configuration page
Table 25 Configuration items
Item Descri
p
tion
Time/Date
Time when the log was generated.
Mode
Whether the log is added or removed.
Source IP
Source IP address.
Reason
Reason why the source IP address was added to the blacklist:
• Auto insert—The source IP address was automatically added to the blacklist by
the system.
• Manual insert—The source IP address was manually added to the blacklist
through the Web interface.
Hold Time
Hold time.
228BDisplaying interzone policy logs
Interzone logs are logs of the flows matching an interzone policy. To record interzone policy logs, you
need to enable the Syslog function when configuring an interzone policy. For more information about
interzone policies, see Access Control Configuration Guide.
Select Log Report > Report > InterZone Policy Log from the navigation tree to enter the page as shown
in
825HFigure 42. 826HTable 26 describes the configuration items.
Figure 42 Interzone policy log configuration page
Table 26 Configuration items
Item Descri
p
tion
Start Time
Time when the flow was created.
End Time
Time when the flow was removed.
Source Zone
Source zone of the flow.
Destination Zone
Destination zone of the flow.