display information about IP address-to-username mappings and Authentication Timestamps,
such as the sources of the mapping information and the times when
users authenticated. You can use this information to help troubleshoot
User-ID and authentication issues. For example, if the firewall
is applying the wrong policy rule for a user, you can view the logs
to verify whether that user is mapped to the correct IP address and
whether the group associations are correct.