Figure 116 Userlog
NOTE:
At present, flow logs refer to session logs only. To generate flow logs, you need to configure session logging according to the following illustration.
3.Configure a session logging policy
Select Log Report > Session Log > Log Policy from the navigation tree, then click Add to create policies as below.
Figure 117 Log Policy
Configuring intrusion detection
Select Intrusion Detection from the navigation tree, enable packet inspection, enable scanning detections, blacklist and URPF check.
As an example, the threshold is set quite low. In real environment, please set the proper threshold according to the requirements.
•Packet inspection
105