Which type of log would contain information on traffic accepted or rejected per policy?

Prepare for the Fortinet Certified Professional (FCP) Exam. Study with targeted questions, detailed hints, and in-depth explanations. Boost your confidence today!

The traffic log is specifically designed to record information about network traffic that is accepted or rejected based on defined policies. It captures detailed records of each session, including source and destination IP addresses, ports, protocols, and whether the traffic was allowed or denied. This log provides valuable insights into how traffic is processed by the network security device, making it essential for monitoring and troubleshooting network issues.

In contrast, event logs typically track system events, alerts, or error messages generated by the device, but they do not provide granular details on policy-driven traffic decisions. Security logs are more focused on security-related events, such as intrusion detection or prevention activities, while system logs record operational messages about the device’s status, performance, and configurations. Therefore, for the specific need to track traffic acceptance or rejection according to policy, the traffic log is the most relevant and accurate choice.

Subscribe

Get the latest from Examzify

You can unsubscribe at any time. Read our privacy policy