An unauthorized access log is generated when a terminal access breaks one or more pre-configured access binding rules, or is not defined in any access bindings.
You can configure the unauthorized access processing policy to deal with the unauthorized terminal accesses. The unauthorized access processing policy includes the following actions:
If you select to shut down or bring up an access device interface in the specified period for an unauthorized access processing policy, you can manually cancel the action before it is executed.
Unauthorized access logs are classified into the following four types: