
320
Appendix K Log descriptions
NN47922-501
Firewall rule match: GRE
(set:%d, rule:%d)
GRE access matched the listed firewall rule and the
Business Secure Router blocked or forwarded it according
to the rule’s configuration.
Firewall rule match:
OSPF (set:%d, rule:%d)
OSPF access matched the listed a firewall rule and the
Business Secure Router blocked or forwarded it according
to the rule’s configuration.
Firewall rule match:
(set:%d, rule:%d)
Access matched the listed firewall rule and the Business
Secure Router blocked or forwarded it according to the
rule’s configuration.
Firewall rule NOT match:
TCP (set:%d, rule:%d)
TCP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
UDP (set:%d, rule:%d)
UDP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
ICMP (set:%d, rule:%d,
type:%d, code:%d)
ICMP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
IGMP (set:%d, rule:%d)
IGMP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
ESP (set:%d, rule:%d)
ESP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
GRE (set:%d, rule:%d)
GRE ac access did not match the listed firewall rule and
the Business Secure Router logged it.
Firewall rule NOT match:
OSPF (set:%d, rule:%d)
OSPF access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
(set:%d, rule:%d)
Access did not match the listed firewall rule and the
Business Secure Router logged it.
Filter default policy
DROP!
IP address or protocol matched a default filter policy and
the Business Secure Router dropped the packet to block
access.
Filter default policy
FORWARD!
IP address or protocol matched a default filter policy.
Access was allowed and the router forwarded the packet.
Filter match DROP <set
%d/rule %d>
IP address or protocol matched the listed filter rule and the
Business Secure Router dropped the packet to block
access.
Filter match FORWARD
<set %d/rule %d>
IP address or protocol matched the listed filter rule. Access
was allowed and the router forwarded the packet.
Table 85
Access logs
Log Message
Description
Summary of Contents for 222
Page 14: ...14 Contents NN47922 501 ...
Page 24: ...24 Tables NN47922 501 ...
Page 30: ...30 Preface NN47922 501 ...
Page 46: ...46 Chapter 2 Introducing the SMT NN47922 501 SMT menus at a glance Figure 6 SMT overview ...
Page 70: ...70 Chapter 3 WAN and Dial Backup Setup NN47922 501 ...
Page 78: ...78 Chapter 4 LAN setup NN47922 501 ...
Page 100: ...100 Chapter 6 Remote Node setup NN47922 501 ...
Page 104: ...104 Chapter 7 IP Static Route Setup NN47922 501 ...
Page 132: ...132 Chapter 9 Network Address Translation NAT NN47922 501 ...
Page 154: ...154 Chapter 11 Filter configuration NN47922 501 ...
Page 158: ...158 Chapter 12 SNMP Configuration NN47922 501 ...
Page 198: ...198 Chapter 15 Firmware and configuration file maintenance NN47922 501 ...
Page 212: ...212 Chapter 17 Remote Management NN47922 501 ...
Page 232: ...232 Appendix B Triangle Route NN47922 501 ...
Page 252: ...252 Appendix D PPPoE NN47922 501 ...
Page 260: ...260 Appendix F Hardware specifications NN47922 501 ...
Page 270: ...270 Appendix G IP subnetting NN47922 501 ...
Page 308: ...308 Appendix H Command Interpreter NN47922 501 ...
Page 312: ...312 Appendix I NetBIOS filter commands NN47922 501 ...
Page 336: ...336 Appendix L Brute force password guessing protection NN47922 501 ...