87
The table below lists all events that can be sent to the SysLog server.
Table 20. SysLog Server Event and Meaning
Event Text
Meaning
ALLOW: Inbound access
request
An inbound request was made, and accepted, from a
public network client to use a service hosted on the firewall
or a client behind the firewall.
ALLOW: Outbound
access request
An outbound request was made, and accepted, from a
public client to use a service hosted on a public network
server.
DENY: Inbound or
outbound access request
A request to traverse the firewall by a public or private
client violated the security policy, and was blocked.
DENY: Firewall interface
access request
A request was made to the public or private firewall
interface by a public or private client that violated the
security policy, and was blocked.
FAILURE: User interface
login (Invalid username
or password)
An attempt was made to login to the user interface, and
access was denied because the username and/or
password was incorrect.
SUCCESS: User interface
login
An attempt was made to login to the user interface, and
access was allowed.
ALLOW: User interface
access [request]
An HTTP GET or POST request was made by an
authenticated user to the user interface.
DENY: Inbound or
outbound [internet attack
name] attack
A known internet attack was detected attempting to
traverse the firewall, and was blocked. Examples of known
internet attacks are Ping Of Death, Teardrop, WinNuke,
XmasTree, SYN Flood, etc.
DENY: Firewall interface
[internet attack name]
attack
A known internet attack directed at the firewall itself was
detected and blocked. Examples of known internet attacks
are Ping Of Death, Teardrop, WinNuke, XmasTree, SYN
Flood, etc.
Firewall Up
The public interface (WAN) connection is up, and the
firewall has begun to police traffic, or the firewall was
previously disabled, and the user has enabled it through
the user interface.
Remote config
Remote configuration management (via HTTP through the
Summary of Contents for 5354
Page 1: ...Cable Modem Router with Wireless N U S E R M A N U A L ...
Page 5: ...5 APPENDIX B IF YOU NEED HELP 141 APPENDIX C COMPLIANCE 142 ...
Page 54: ...54 Table 4 describes the items you can select Figure 7 Example of Diagnostics Ping Page ...
Page 66: ...66 Figure 15 shows an example of the menu Figure 15 Example of Backup Page ...
Page 68: ...68 Figure 16 Example of Options Page ...
Page 90: ...90 Figure 26 Example of Basic Page ...
Page 103: ...103 Figure 32 Example of Guest Network Page ...
Page 110: ...110 Figure 35 Example of WMM Page ...
Page 118: ...118 Figure 39 Example of IPSec Page ...