![Moxa Technologies IEF-G9010 Series User Manual Download Page 72](http://html1.mh-extra.com/html/moxa-technologies/ief-g9010-series/ief-g9010-series_user-manual_1841892072.webp)
IEF-G9010 Series User Manual
72
11.
The Log Screens
This chapter describes the system event logs and security detection logs you can view from the
management console.
Viewing Cybersecurity Logs
The cybersecurity logs include logs detected by both the intrusion prevention and denial of service
prevention features.
Steps:
1.
Go to [Logs] > [Cyber Security Logs].
The following table describes the log table.
Field
Description
Time
The time the log entry was created.
Event ID
The ID of the matched signature.
Security Category
The category of the matched signature.
Security Severity
The severity level assigned to the matched signature.
Security Rule Name
The name of the matched signature.
Direction
The direction flow of the connection.
Interface
The network interface which received the connection.
Attacker
The IP address of the host device that initiated the cyberattack.
Source MAC Address
The source MAC address of the connection.
Source IP Address
The source IP address of the connection.
Source Port
The source port of the connection.
Destination MAC Address
The destination MAC address of the connection.
Destination IP Address
The destination IP address of the connection.
Destination Port
The destination port of the connection.
VLAN ID
The VLAN ID of the connection.
Ethernet Type
The Ethernet type of the connection.
IP Protocol Name
The IP protocol name of the connection.
Action
The action performed based on the policy settings.
Count
The number of detected network packets within the detection period after
the detection threshold was reached.