316
Appendix J Log descriptions
NN47923-501
Firewall rule match: GRE
(set:%d, rule:%d)
GRE access matched the listed firewall rule and the
Business Secure Router blocked or forwarded it according
to the rule’s configuration.
Firewall rule match:
OSPF (set:%d, rule:%d)
OSPF access matched the listed a firewall rule and the
Business Secure Router blocked or forwarded it according
to the rule’s configuration.
Firewall rule match:
(set:%d, rule:%d)
Access matched the listed firewall rule and the Business
Secure Router blocked or forwarded it according to the
rule’s configuration.
Firewall rule NOT match:
TCP (set:%d, rule:%d)
TCP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
UDP (set:%d, rule:%d)
UDP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
ICMP (set:%d, rule:%d,
type:%d, code:%d)
ICMP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
IGMP (set:%d, rule:%d)
IGMP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
ESP (set:%d, rule:%d)
ESP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
GRE (set:%d, rule:%d)
GRE ac access did not match the listed firewall rule and
the Business Secure Router logged it.
Firewall rule NOT match:
OSPF (set:%d, rule:%d)
OSPF access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
(set:%d, rule:%d)
Access did not match the listed firewall rule and the
Business Secure Router logged it.
Filter default policy
DROP!
IP address or protocol matched a default filter policy and
the Business Secure Router dropped the packet to block
access.
Filter default policy
FORWARD!
IP address or protocol matched a default filter policy.
Access was allowed and the router forwarded the packet.
Filter match DROP <set
%d/rule %d>
IP address or protocol matched the listed filter rule and the
Business Secure Router dropped the packet to block
access.
Filter match FORWARD
<set %d/rule %d>
IP address or protocol matched the listed filter rule. Access
was allowed and the router forwarded the packet.
Table 81
Access logs
Log Message
Description
Содержание 252
Страница 13: ...Contents 13 Nortel Business Secure Router 252 Configuration Advanced SIP Register Server 337 RTP 337 Index 341 ...
Страница 14: ...14 Contents NN47923 501 ...
Страница 20: ...20 Figures NN47923 501 ...
Страница 24: ...24 Tables NN47923 501 ...
Страница 30: ...30 Preface NN47923 501 ...
Страница 42: ...42 Chapter 1 Getting to know your Nortel Business Secure Router 252 NN47923 501 ...
Страница 48: ...48 Chapter 2 Introducing the SMT NN47923 501 SMT menus at a glance Figure 6 SMT overview ...
Страница 72: ...72 Chapter 3 WAN and Dial Backup Setup NN47923 501 ...
Страница 80: ...80 Chapter 4 LAN setup NN47923 501 ...
Страница 84: ...84 Chapter 5 Internet access NN47923 501 ...
Страница 98: ...98 Chapter 6 Remote Node setup NN47923 501 ...
Страница 102: ...102 Chapter 7 IP Static Route Setup NN47923 501 ...
Страница 130: ...130 Chapter 9 Network Address Translation NAT NN47923 501 ...
Страница 156: ...156 Chapter 12 SNMP Configuration NN47923 501 ...
Страница 178: ...178 Chapter 14 System information and diagnosis NN47923 501 ...
Страница 198: ...198 Chapter 15 Firmware and configuration file maintenance NN47923 501 ...
Страница 212: ...212 Chapter 17 Remote Management NN47923 501 ...
Страница 232: ...232 Appendix B Triangle Route NN47923 501 ...
Страница 252: ...252 Appendix D PPPoE NN47923 501 ...
Страница 256: ...256 Appendix E Hardware specifications NN47923 501 ...
Страница 266: ...266 Appendix F IP subnetting NN47923 501 ...
Страница 308: ...308 Appendix H NetBIOS filter commands NN47923 501 ...
Страница 332: ...332 Appendix K Brute force password guessing protection NN47923 501 ...