Method used to export policy matching logs on the USG6000

42

The method used to export policy matching logs on the USG6000 is as follows:

1. Choose Monitor > Logs > Policy Matching Logs.

2. Select Column Customization and select or cancel various types of conditions displayed in policy matching logs.

3. Click Export to export policy matching logs in the CSV format to the administrator's PC.

Other related questions:
Methods used to export logs of the USG2000, USG5000, and USG6000
Methods used to export logs of the USG2000, USG5000, and USG6000: 1. The method used to export logs of the USG6000 is as follows: Choose Monitor > Logs > Traffic Logs/Threat Logs/URL Logs/Content Logs/Operation Logs/System Logs/User Activity Logs/Policy Matching Logs/Mail Filtering Logs/Audit Logs. Click Export to export system logs in the CSV format to the administrator's PC. 2. The method used to export logs of the USG2000 or USG6000 is as follows: a. Choose Logs > Log Display > Log Display. b. Select the Log Display tab. c. Open or save a log file in the following ways: 1) Click Export. In the displayed File Download dialog box, click Open to view the configuration of the log buffer and log content. 2) Click Save to save the file driver or folder. Click Save. If the operation is successful, you can view the saved logs in the log export path.

Query of policy matching logs on the USG6000 series
By checking policy matching logs, you can learn traffic matching policies and determine whether security policies are correctly configured or achieve expected effects, to facilitate fault locating. Context Only the USG6000 supports policy matching logs, and such logs can be displayed only when a hard disk is installed. For the USG6650/6660/6670/6680, the policy matching log page is displayed no matter whether hard disks are installed. The firewall is deployed between the Internet and the network to be protected. If traffic matches a security policy, a policy matching log is generated. Before querying policy matching logs, run the log type policy enable command on the firewall to enable the policy matching log function. Choose Monitor > Log > Policy Matching Log to view information about policy matching logs. Choose Customize and select/deselect conditions for the display of policy matching logs. Click Export to export policy matching logs in CSV format to the management PC.

Security policy matching order on the USG6000 series
When multiple security policies are to be matched, they are matched in a specific order. Therefore, you are advised to configure more fine-grained security policies first.

Security policy matching order on the USG6000
On the USG6000, the device preferentially executes security policies configured earlier. Therefore, you are advised to first configure security policies with smaller matching scopes and accurate matching conditions and then configure security policies with larger matching scopes and wider matching conditions.

Exporting traffic logs on the USG6650
Perform as follows to export traffic logs on the USG6650: 1. Choose Monitor > Log > Flow log. 2. Choose Customize and select/deselect conditions for traffic log display. 3. Optional: Click Export to export traffic logs in CSV format to the administrator PC.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top