Log
- Print
- PDF
Log
- Print
- PDF
Article summary
Did you find this summary helpful?
Thank you for your feedback
Available in Classic
In Log, the Log menu describes the page configuration and how to view logs collected by firewall.
Note
Logs collected by firewall are collected and stored in Cloud Log Analytics, and the retention period and size of the logs are determined by the Cloud Log Analytics settings. For more information on Cloud Log Analytics, please refer to Cloud Log Analytics guide.
Log page
The Log page is laid out as follows:
Area | Description |
---|---|
① Select firewall | The firewall that is being currently checked is displayed, and you can move to other firewall pages through the dropdown menu. |
② Search area | You can search and view logs collected by item, date, and time |
③ Download Excel | Click to download the searched log as an Excel file |
④ Default deny logging | If you enable the collection of logs corresponding to default deny
|
⑤ Log list | Show collected logs |
Note
If you download the collected logs as an Excel file, only the searched data, not all the data, will be downloaded.
Search log
You can view logs collected by the firewall. The following is how to view logs.
- Click the Services > Services > Security > Secure Zone menu on the NAVER Cloud Platform console one-by-one in that order.
- Click the Secure Zone Firewall menu.
- Click the [Log] button of the firewall you want to view the logs for.
- If necessary, set the search conditions and click the [Search] button.
- You can check the collected logs according to the search conditions.
- Receive Time: date and time the log was collected
- Source IP: IP of customer-owned instance/private LB/SSL VPN
- Destination IP: IP of customer-owned instance
- Protocol: protocol used when accessing the Secure Zone
- Port: port number used when accessing the Secure Zone
- Action: action performed
- Accept: access allowed by policy
- Deny: access blocked by policy
- Close: terminated normally due to FIN or RST
- Timeout: allowed but blocked due to timeout value or TCP SYN sent but no response from the remote
- Ip-conn: allowed but terminated due to fortigate not receiving response packets or there is an ICMP/UDP request but no response
- Policy: name of the policy for which the corresponding log is hit
- You can check the collected logs according to the search conditions.
Was this article helpful?