Overview

The Access Logs feature provides a chronological record of every interaction between ISPBills operators and the network devices managed by the system — including routers, access points, and OLTs. It serves as an audit trail that allows network managers to understand who did what, on which device, and when.

What Is Logged

Each entry in the access log captures the following information:

  • Timestamp — the date and time at which the action took place.
  • Device — the network device (router, AP, OLT, etc.) that was accessed or modified.
  • Operator — the staff member or operator account that performed the action.
  • Action — a description of what was done, such as connecting to a device, pushing a configuration change, or retrieving status data.

Using Access Logs for Auditing

Access logs are particularly valuable in multi-operator environments. If a configuration change causes a network disruption, you can consult the logs to determine which operator made a change and to which device, narrowing down the cause quickly. They are also useful for compliance purposes, providing documented evidence of who has accessed sensitive network infrastructure.

Viewing the Logs

Navigate to Monitoring › Access Logs to view the full log list. You can filter entries by date range, device, or operator to focus on the relevant records. The most recent entries appear at the top by default.