The table below lists all events that can be sent to the SysLog server.
Table 27. SysLog Server Event and Meaning
Event Text
Meaning
An inbound request was made, and accepted, from a
public network client to use a service hosted on the firewall
or a client behind the firewall.
ALLOW: Inbound access
request
An outbound request was made, and accepted, from a
public client to use a service hosted on a public network
server.
ALLOW: Outbound
access request
A request to traverse the firewall by a public or private
client violated the security policy, and was blocked.
DENY: Inbound or
outbound access request
A request was made to the public or private firewall
interface by a public or private client that violated the
security policy, and was blocked.
DENY: Firewall interface
access request
An attempt was made to login to the user interface, and
access was denied because the username and/or
password was incorrect.
FAILURE: User interface
login [Invalid username
or password]
An attempt was made to login to the user interface, and
access was allowed.
SUCCESS: User interface
login
An HTTP GET or POST request was made by an
authenticated user to the user interface.
ALLOW: User interface
access [request]
A known internet attack was detected attempting to
traverse the firewall, and was blocked. Examples of known
internet attacks are Ping Of Death, Teardrop, WinNuke,
XmasTree, SYN Flood, etc.
DENY: Inbound or
outbound [internet attack
name] attack
A known internet attack directed at the firewall itself was
detected and blocked. Examples of known internet attacks
are Ping Of Death, Teardrop, WinNuke, XmasTree, SYN
Flood, etc.
DENY: Firewall interface
[internet attack name]
attack
Firewall Up
The public interface (WAN) connection is up, and the
101
Содержание 5363
Страница 1: ...Cable Modem Router Cable Modem plus Dual band Wireless AC Router U S E R M A N U A L ...
Страница 50: ...Figure 4 Example Wireless Primary Network page 50 ...
Страница 54: ...Figure 5 Example of Guest Network Page 54 ...
Страница 64: ...Figure 9 Example of Access Control Page 64 ...
Страница 80: ...Figure 17 Example of IP Filtering Page 80 ...
Страница 104: ...Figure 27 Example of Basic Setup Page 104 ...
Страница 134: ...Figure 42 Example of the Connection Page 134 ...