Login Log
The Login Log page provides an operator-facing overview of authentication activity on the Guest WiFi network. It displays authentication-related records and aggregated statistics generated by enabled login methods, allowing operators to monitor access activity for operational, security, or compliance purposes. The availability and scope of displayed data depend on the selected authentication methods and system configuration.
⚠️ IMPORTANT NOTES:
-
Displayed login data is generated only when corresponding login methods are enabled and configured by the operator.
-
The type of information shown may vary depending on the authentication method used.
-
The operator is responsible for ensuring that the collection, display, export, and retention of login data complies with applicable laws and regulations.
-
Data retention duration and automatic deletion behavior are configured under System > Data Retention
Features
1. Counters and Filters
- Main Title: Displays the "Login Log" heading alongside the total number of logins (Total Logins).

- Time Filters: A dropdown menu allows you to filter login data by predefined intervals.
2. Statistics and Visualizations
- Total Logins: Displays the number of recorded logins (on selected time period) with a counter.
- Top Devices: A pie chart provides a breakdown of login activity by device type, offering insights into the most commonly used devices.
- Login Log Chart: A line graph visualizes time-based login counts for all login methods, helping you identify trends and peaks over time

3. Table Overview
The login log table presents detailed information for each login event in a structured format.
- Login Type: Indicates the authentication method (e.g., Free Access, Email, Facebook Login etc.).
- Login Data: Authentication-related identifiers, such as email addresses, mobile numbers, or voucher codes, depending on the login method used.
- Login Time: The exact time of the login event.
- MAC Address: The unique identifier of the user’s device.
- IP Address: The IP address assigned to the user.
- Device Type: The type of device used for login (e.g., smartphone, laptop).
- Action: Options for managing or removing specific login records.
4. Search and Filtering Options
- Search Bar: Quickly find specific login entries by typing keywords.
- Entries Per Page: Adjust the number of entries displayed in the table (10, 25, 50, or 100).
5. Export and Management
- Export Options:
Export login data in the following formats:
- CSV: For further analysis or reporting.
- Print Mode: For a printable view of the login log.
- Delete All: Allows the operator to remove stored login log records from the system in accordance with the configured data retention policy.
How to Use
- Filter Data: Use the time filters or custom date range to narrow down the data to your desired period.
- Analyze Visuals: Review the pie and line graphs for insights into login trends and top devices.
- Search or Filter Table: Utilize the search bar and table filters to find specific login records.
- Export Data: Click on the export button to download data for further analysis or printing.
- Manage Records: Use the action options in the table to remove or review specific entries as needed.
The Login Log page provides operators with both aggregated insights and detailed authentication records to support network monitoring and operational review.






