Whether the USG6000 series displays traffic logs

30

Traffic logs are displayed only when the USG6000 series has hard disks installed.
For the USG6650/6660/6670/6680, the traffic log page is displayed no matter whether hard disks are installed.

Other related questions:
Whether the USG6000 series supports traffic logs
The USG6000 series allows you to view traffic logs on the web UI. By checking traffic logs, you can learn characteristics of traffic on the network, bandwidth usage, security policies, and validity of the traffic policy configuration. The USG is deployed between the Internet and the network to be protected. Sessions are generated when traffic passes through the USG. The sessions age out after a certain period, and the USG records traffic logs. Do as follows to view traffic logs on the web UI: 1. Choose Monitor > Log > Traffic Log. 2. Choose Customize and select/deselect conditions for traffic log display. 3. Click Export to export traffic logs in CSV format to the management PC. (Only devices with hard disks support this step.)

Displaying traffic statistics on the USG6000 series
The USG6000 series enables you to use the CLI to view the traffic statistics of the device or the traffic statistics of an interface/device in the past 60 minutes, 24 hours, and 30 days. In any view, run the display all-traffic command to display the total traffic of all physical interfaces on the device from device startup or last traffic reset to the time when you display the traffic. In any view, run the display history-traffic { total | all | interface interface-type interface-number } [ hour | day | month ] command to view historical traffic statistics of an interface, all interfaces, or the device within a given time range.

Whether the USG6000 series supports threat logs
The USG6000 series allows you to view threat logs on the web UI. By checking threat logs, you can view detection and defense records for network threats such as antivirus, intrusion prevention, DDoS, botnets, Trojan horses, and worms, learn historical and ongoing threat events, and adjust security policies or implement active defense in a timely manner. The USG is deployed between the Internet and the network to be protected. Threat logs are generated when the USG detects viruses, threats, botnets, Trojan horses, worms, or attacks in traffic. Do as follows to view traffic logs on the web UI: 1. Choose Monitor > Log > Threat Log to view threat logs. 2. Choose Customize and select/deselect conditions for threat log display. 3. Click Export to export threat logs in CSV format to the management PC. (Only devices with hard disks support this step.)

Whether the USG6000 series displays alarm information
The alarm page is displayed only when the USG6000 series does not have hard disks. For the USG6650/6660/6670/6680, the alarm page is displayed no matter whether hard disks are installed.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top