Query Unauthorized Access Logs
This function enables you to query unauthorized access logs based on:
- terminal MAC
- terminal IP
- terminal name
- conflict type
- device label
- device IP
- interface description
- action status
- conflict found start time
- conflict found end time
Operation Procedure
- Click the Resource tab, and then click Unauthorized Access in the navigation tree.
- Click All Unauthorized Access Logs to enter the unauthorized access log management page.
- Move your mouse cursor over the Query area to open the Query window.
- Set query criteria on the window.
- Click Query.
Related Topics