Log formats supported by the USG6000 series

63

The USG6000 supports outputting binary logs and syslogs.

Other related questions:
Formatting hard disks for the USG6000 series
The USG6000 hard disk supports formatting. However, formatting a hard disk may cause disk data to be lost. Exercise caution when you perform this operation. To format a hard disk, run the reset disk command in the diagnose view. system-view [sysname] diagnose [sysname-diagnose] reset disk

Format of USG6000 profiles
Profiles are text files. Profiles are saved in the command format. Only non-default parameters are saved (for default values of configuration parameters, see the corresponding chapters). Commands are organized based on the command view. Commands in the same command view form a section. Sections are separated by empty lines or comment lines (started with "#"). The number of empty lines or comment lines is not fixed. The sequence of sections is as follows: global configuration, physical port configuration, logical interface configuration, and routing protocol configuration.

Whether the USG6000 series supports threat logs
The USG6000 series allows you to view threat logs on the web UI. By checking threat logs, you can view detection and defense records for network threats such as antivirus, intrusion prevention, DDoS, botnets, Trojan horses, and worms, learn historical and ongoing threat events, and adjust security policies or implement active defense in a timely manner. The USG is deployed between the Internet and the network to be protected. Threat logs are generated when the USG detects viruses, threats, botnets, Trojan horses, worms, or attacks in traffic. Do as follows to view traffic logs on the web UI: 1. Choose Monitor > Log > Threat Log to view threat logs. 2. Choose Customize and select/deselect conditions for threat log display. 3. Click Export to export threat logs in CSV format to the management PC. (Only devices with hard disks support this step.)

Whether the USG6000 series supports traffic logs
The USG6000 series allows you to view traffic logs on the web UI. By checking traffic logs, you can learn characteristics of traffic on the network, bandwidth usage, security policies, and validity of the traffic policy configuration. The USG is deployed between the Internet and the network to be protected. Sessions are generated when traffic passes through the USG. The sessions age out after a certain period, and the USG records traffic logs. Do as follows to view traffic logs on the web UI: 1. Choose Monitor > Log > Traffic Log. 2. Choose Customize and select/deselect conditions for traffic log display. 3. Click Export to export traffic logs in CSV format to the management PC. (Only devices with hard disks support this step.)

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top