IEF-G9010 Series User Manual
73
Viewing Policy Enforcement Logs
The policy enforcement logs cover logs created when policy enforcement rules are triggered based on the
configured rule setting (allow, deny, or protocol filter profile).
Steps:
1.
Go to [Logs] > [Policy Enforcement Logs].
The following table describes the log table.
Field
Description
Time
The time the log entry was created.
Rule Name
The name of the policy enforcement rule that was used to generate the
log.
Direction
The direction flow of the connection.
Interface
The network interface which received the connection.
Source MAC Address
The source MAC address of the connection.
Source IP Address
The source IP address of the connection.
Source Port
The source port of the connection if the selected protocol is TCP/UDP.
The ICMP type if the selected protocol is ICMP.
Destination MAC Address
The destination MAC address of the connection.
Destination IP Address
The destination IP address of the connection.
Destination Port
The destination port of the connection if the selected protocol is TCP/UDP.
The ICMP type if the selected protocol is ICMP.
VLAN ID
The VLAN ID of the connection.
IP Protocol Name
The IP protocol name of the connection.
Action
The action performed based on the policy settings.