HP VPN Firewall Appliances System Management and Maintenance Configuration Guide
103
• System logs.
• Connection limit logs.
• Attack prevention logs.
• Blacklist logs.
• Interzone policy logs.
• User logs.
Except that the user logs can be viewed at both the Web interface and the CLI, all other types of log
information can only be viewed in the Web interface.
Displaying system logs
Select Log Report > Report > System Log from the navigation tree to enter the page as shown in Figure
39. Table 21 describes the
configuration items.
Figure 39 Operation log configuration page
Table 21 Configuration items
Item Descri
p
tion
Time/Date
Time when the system log was generated.
Source
Module that generated the system log.
Level
Severity level of the system log. For more information about severity levels, see Table
22.
Description
Content of the system log.