Page 121 / 211 Scroll up to view Page 116 - 120
FiOS Router User Manual
121
© 2010 Verizon. All Rights Reserved.
Firewall rules were changed
- the firewall rule set has been modified.
Firewall status changed
- the firewall changed status from up to down or
the vice versa, as specified in the event type description.
First packet in connection is not a SYN packet
- a packet has been blocked
due to a TCP connection that started without a SYN packet.
Fragmented packet
- a fragment has been rejected.
Fragmented packet, bad align
- a packet has been blocked because, after
defragmentation, the packet was badly aligned.
Fragmented packet, header too big
- a packet has been blocked because,
after defragmentation, the header was too big.
Fragmented packet, header too small
- a packet has been blocked
because, after defragmentation, the header was too small.
Fragmented packet, no memory
- a fragmented packet has been blocked
because there is no memory for fragments.
Fragmented packet, overlapped
- a packet has been blocked because, after
defragmentation, there were overlapping fragments.
Fragmented packet, packet exceeds
- a packet has been blocked because,
after defragmentation, the packet exceeded.
Fragmented packet, packet too big
- a packet has been blocked because,
after defragmentation, the packet was too big.
FTP port request to 3rd party is forbidden (Possible bounce attack)
-
a packet has been blocked.
ICMP Flood Protection
- a packet has been blocked, stopping an
ICMP (Internet Control Message Protocol) flood.
ICMP protection
- a broadcast ICMP message has been blocked.
ICMP redirect protection
- an ICMP redirected message has been blocked.
ICMP replay
- an ICMP replay message has been blocked.
IGMP
packet
- an IGMP packet has been accepted.
Page 122 / 211
Configuring Security Settings
6.10
Security Log
6
122
© 2010 Verizon. All Rights Reserved.
Illegal packet options
- the options field in the packet’s header is either
illegal or forbidden.
IP Version 6
- an IPv6 packet has been accepted.
IPV6 over IPV4
- an IPv6 over IPv4 packet has been accepted.
Malformed packet: Failed parsing
- a packet has been blocked because it
is malformed.
Maximum security enabled service
- a packet has been accepted because
it belongs to a permitted service in the maximum security level.
Multicast
IGMP
connection
- a multicast packet has been accepted.
NAT Error: Connection pool is full. No connection created
- a connection
has not been created because the connection pool is full.
NAT Error: Conflict Mapping already exists
- a conflict occurred because
the NAT mapping already exists, so NAT failed.
NAT Error: No free NAT IP
- no free NAT IP, so NAT has failed.
NAT out
failed
- NAT failed for this packet.
Outbound Auth1X
- an outbound Auth1X packet has been accepted.
Packet invalid in connection
- an invalid connection packet has been
blocked.
Parental
control
- a packet has been blocked because of parental control.
Passive attack on ftp-server: Client attempted to open Server ports
- a
packet has been blocked.
PPP Discover
- a PPP discover packet has been accepted.
PPP Session
- a PPP session packet has been accepted.
PPTP
connection
- a packet inquiring whether the FiOS Router is ready to
receive a PPTP connection has been accepted.
Remote
administration
- a packet designated for the FiOS Router
management has been accepted/blocked.
Page 123 / 211
FiOS Router User Manual
123
© 2010 Verizon. All Rights Reserved.
Router initiated traffic
- all traffic the FiOS Router initiates is recorded.
Service
- a packet has been accepted because of a certain service, as
specified in the event type.
Spoofing protection
- a packet from the Internet with a source IP belonging
the local network has been blocked.
STP packet
- an STP (Spanning Tree Protocol) packet has been
accepted/rejected.
SynCookies Protection
- a SynCookies packet has been blocked.
Trusted
device
- a packet from a trusted device has been accepted.
UDP Flood Protection
- a packet has been blocked, stopping a UDP flood.
User
authentication
- a message arrived during login time, including both
successful and failed authentication.
Wildcard connection hooked
- debug message regarding connection.
Wildcard connection opened
- debug message regarding connection.
WinNuke protection
- a WinNuke attack has been blocked.
6.10d
Details
Displays a textual description of the event.
Page 124 / 211
Configuring Security Settings
6.10
Security Log
6
124
© 2010 Verizon. All Rights Reserved.
6.10e
Security Log Settings
To view or change the security log settings:
Click
1.
Settings
in the Security Log screen. The “Security Log Settings”
screen appears.
Select the type of activities that will generate a log message:
2.
Accepted Incoming Connections
- activating this check box generates a log
message for each successful attempt to establish an inbound connection to
the local network.
Accepted Outgoing Connections
- activating this check box generates a
log message for each successful attempt to establish an outgoing connection
to the public network.
Select the type of blocked events to be listed in the log:
3.
All Blocked Connection Attempts
- activating this check box generates log
messages for all blocked events.
Other Blocked Events
- if “All Blocked Connection Attempts” is un-checked,
select specific blocked events from this list to generate log messages.
Page 125 / 211
FiOS Router User Manual
125
© 2010 Verizon. All Rights Reserved.
Click in the “Remote Administration Attempts” check box to write a log
4.
message for each remote-administration connection attempt, whether
successful or not.
Click in the “Connection States” check box to track connection handling by
5.
the firewall and Application Level Gateways (ALGs).
Click
6.
Apply
to save changes.

Rate

3.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top