
Appendix K Log descriptions
319
Nortel Business Secure Router 222 Configuration — Advanced
Table 85
Access logs
Log Message
Description
Firewall default
policy: TCP (set:%d)
TCP access matched the default policy of the listed ACL
set and the Business Secure Router blocked or forwarded
it according to the ACL set’s configuration.
Firewall default
policy: UDP (set:%d)
UDP access matched the default policy of the listed ACL
set and the Business Secure Router blocked or forwarded
it according to the ACL set’s configuration.
Firewall default
policy: ICMP (set:%d,
type:%d, code:%d)
ICMP access matched the default policy of the listed ACL
set and the Business Secure Router blocked or forwarded
it according to the ACL set’s configuration.
Firewall default
policy: IGMP (set:%d)
IGMP access matched the default policy of the listed ACL
set and the Business Secure Router blocked or forwarded
it according to the ACL set’s configuration.
Firewall default
policy: ESP (set:%d)
ESP access matched the default policy of the listed ACL
set and the Business Secure Router blocked or forwarded
it according to the ACL set’s configuration.
Firewall default
policy: GRE (set:%d)
GRE access matched the default policy of the listed ACL
set and the Business Secure Router blocked or forwarded
it according to the ACL set’s configuration.
Firewall default
policy: OSPF (set:%d)
OSPF access matched the default policy of the listed ACL
set and the Business Secure Router blocked or forwarded
it according to the ACL set’s configuration.
Firewall default
policy: (set:%d)
Access matched the default policy of the listed ACL set and
the Business Secure Router blocked or forwarded it
according to the ACL set’s configuration.
Firewall rule match: TCP
(set:%d, rule:%d)
TCP access matched the listed firewall rule and the
Business Secure Router blocked or forwarded it according
to the rule’s configuration.
Firewall rule match: UDP
(set:%d, rule:%d)
UDP access matched the listed firewall rule and the
Business Secure Router blocked or forwarded it according
to the rule’s configuration.
Firewall rule match:
ICMP (set:%d, rule:%d,
type:%d, code:%d)
ICMP access matched the listed firewall rule and the
Business Secure Router blocked or forwarded it according
to the rule’s configuration.
Firewall rule match:
IGMP (set:%d, rule:%d)
IGMP access matched the listed firewall rule and the
Business Secure Router blocked or forwarded it according
to the rule’s configuration.
Firewall rule match: ESP
(set:%d, rule:%d)
ESP access matched the listed firewall rule and the
Business Secure Router blocked or forwarded it according
to the rule’s configuration.
Содержание 222
Страница 14: ...14 Contents NN47922 501 ...
Страница 24: ...24 Tables NN47922 501 ...
Страница 30: ...30 Preface NN47922 501 ...
Страница 46: ...46 Chapter 2 Introducing the SMT NN47922 501 SMT menus at a glance Figure 6 SMT overview ...
Страница 70: ...70 Chapter 3 WAN and Dial Backup Setup NN47922 501 ...
Страница 78: ...78 Chapter 4 LAN setup NN47922 501 ...
Страница 100: ...100 Chapter 6 Remote Node setup NN47922 501 ...
Страница 104: ...104 Chapter 7 IP Static Route Setup NN47922 501 ...
Страница 132: ...132 Chapter 9 Network Address Translation NAT NN47922 501 ...
Страница 154: ...154 Chapter 11 Filter configuration NN47922 501 ...
Страница 158: ...158 Chapter 12 SNMP Configuration NN47922 501 ...
Страница 198: ...198 Chapter 15 Firmware and configuration file maintenance NN47922 501 ...
Страница 212: ...212 Chapter 17 Remote Management NN47922 501 ...
Страница 232: ...232 Appendix B Triangle Route NN47922 501 ...
Страница 252: ...252 Appendix D PPPoE NN47922 501 ...
Страница 260: ...260 Appendix F Hardware specifications NN47922 501 ...
Страница 270: ...270 Appendix G IP subnetting NN47922 501 ...
Страница 308: ...308 Appendix H Command Interpreter NN47922 501 ...
Страница 312: ...312 Appendix I NetBIOS filter commands NN47922 501 ...
Страница 336: ...336 Appendix L Brute force password guessing protection NN47922 501 ...