What Do I Do If There Is No Data in Access Control Logs?
Access control logs record the traffic that matches the ACL protection policy. To view access control logs, configure the ACL policy first.
- For details about how to add a protection rule, see Adding a Protection Rule.
- For details about the records of all traffic passing through CFW, see Traffic Logs.
- For details about attack event records, see Attack Event Logs.
Troubleshooting FAQs
- How Do I Troubleshoot CFW Protection When Service Traffic Is Abnormal?
- Why Are Traffic and Attack Logs Incomplete on the Traffic Analysis Page?
- Why Does a Configured Policy Not Take Effect?
- What Do I Do If IPS Blocks Normal Services?
- What Do I Do If There Is No Data in Access Control Logs?
- How Does Huawei Cloud CFW Detect and Defend Against Attacks Exploiting the Apache Log4j Remote Code Execution Vulnerability?
- How Does CFW Detect and Defend Against Attacks Exploiting the Spring Framework Remote Code Execution Vulnerability?
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.
more