Appendix A – Disposition of Events
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D)
141
Appendix A – Disposition of Events for
the RouteFinder v3.2x
For ICSA Certification
Based on
The Modular Firewall Certification Criteria
Baseline module - version 4.0
Revision History
Date Revision
Remarks/Changes
16-Aug-2004 R1
Baseline
document
Table of Contents
1. Abstract.......................................................................................................................................................... 142
II. Inbound Access Log ..................................................................................................................................... 143
III. Outbound Access Log ................................................................................................................................. 145
IV. Access Requests through Firewall Dropped ............................................................................................ 146
V. Access Requests to Firewall Dropped ....................................................................................................... 146
VI. Administrative Authentication Logs .......................................................................................................... 147
VII. Admin Port Access Log ............................................................................................................................. 147
VIII. Startup History Log ................................................................................................................................... 147
IX. User Log........................................................................................................................................................ 147
X. Fragmented Dropped Log ............................................................................................................................ 147
XI. ICMP Information ......................................................................................................................................... 148
Table of Figures
Figure 1 – Inbound Access
143
Figure 2 – Snapshot of Inbound Access Log
143
Figure 3 – Inbound Access (DNAT with Connection Tracking)
144
Figure 4 – Outbound Access
145
Figure 5 – Snapshot of Outbound Access Log
145
Figure 6 – Snapshot of Outbound Access Log (with Connection Tracking) 145
Figure 7 – Snapshot of Through Firewall Dropped Log
146
Figure 8 – Access Requests to Firewall Dropped
146
Figure 9 – Snapshot of To Firewall Dropped Log
146
Figure 10 – Snapshot of Administrative Authentication Log
147
Figure 11 – Snapshot of Admin Port Access Log
147
Figure 12 – Snapshot of Startup History
147
Figure 13 – Snapshot of User Log
147
Figure 14 – Snapshot of Fragmented Dropped Log
147
Figure 15 – Snapshot of Log with ICMP Information
148