Revision
1
Parameters
iface
sessionid
remotegw
2.19.10. l2tp_session_request (ID: 02800010)
Default Severity
NOTICE
Log Message
L2TP session request sent. Tunnel ID: <tunnelid>
Explanation
An L2TP session request has been sent over the specified L2TP tunnel.
Gateway Action
None
Recommended Action
None.
Revision
1
Parameters
tunnelid
2.19.11. l2tp_session_up (ID: 02800011)
Default Severity
NOTICE
Log Message
L2TP session up. Tunnel ID: <tunnelid>, Session ID: <sessionid>,
Auth: <auth>, MPPE: <mppe>
Explanation
The L2TP session negotiation has completed successfully.
Gateway Action
None
Recommended Action
None.
Revision
1
Parameters
tunnelid
sessionid
auth
mppe
2.19.12. l2tp_no_userauth_rule_found (ID: 02800014)
Default Severity
WARNING
Log Message
Did not find a matching userauth rule for this L2TP server! Tunnel ID:
<tunnelid>, Session ID: <sessionid>
Explanation
The L2TP server was unsuccessful trying to find a matching userauth
rule.
Gateway Action
None
Recommended Action
Make sure the userauth rules are configured correctly.
Revision
1
2.19.10. l2tp_session_request (ID:
02800010)
Chapter 2. Log Message Reference
263
Summary of Contents for NetDefend SOHO DFL-160
Page 20: ...List of Tables 1 Abbreviations 23 20 ...
Page 21: ...List of Examples 1 Log Message Parameters 22 2 Conditional Log Message Parameters 22 21 ...
Page 31: ...1 3 Severity levels Chapter 1 Introduction 31 ...
Page 356: ...2 33 53 sent_sslalert ID 03700511 Chapter 2 Log Message Reference 356 ...