Page 106 / 208 Scroll up to view Page 101 - 105
SECURITY
LOG
You can modify the type of events that display in the security log. This
does not modify the event itself. It simply changes the information that
displays in the log.
6.6a/
EVENT TYPES
The security log records the following event types:
Access control
– a packet has been accepted/blocked due to an
access control rule.
Advance filter rule
– a packet has been accepted/blocked due to an
advanced filter rule.
ARP
– an ARP packet has been accepted.
AUTH:113 request
- an outbound packet for AUTH protocol has
been accepted (for maximum security level).
Broadcast/Multicast protection
– a packet with a broadcast/
multicast source IP has been blocked.
Default policy
– a packet has been accepted/blocked according to
the default policy.
Defragmentation failed
– the fragment has been stored in memory
and blocked until all fragments have arrived and defragmentation
can be performed.
DHCP request
– your Gateway sent a DHCP request (depends on the
distribution).
DHCP response
- your Gateway sent a DHCP response (depends on
the distribution).
Page 107 / 208
Echo/Chargen/Quote/Snork protection
– a packet has been blocked
due to Echo/Chargen/Quote/Snork protection.
Firewall internal
– from the firewall internal mechanism, event type
is recorded and an accompanying explanation will be added.
Firewall rules were changed
– the rule set has been modified.
Firewall status changed
– the firewall status changed from up to
down or vice versa, as specified in the event type description.
First packet in connection is not a SYN packet
– a packet has been
blocked due to a TCP connection that started without a SYN packet.
Fragmented packet
– a fragment has been rejected.
Fragmented packet, bad align
– a packet has been blocked because,
after defragmentation, the packet was badly aligned.
Fragmented packet, header too big
– a packet has been blocked
because, after defragmentation, the header was too big.
Fragmented packet, header too small
– a packet has been blocked
because, after defragmentation, the header was too small.
Fragmented packet, no memory
– a packet has been blocked
because there is no memory for fragments.
Fragmented packet, overlapped
– a packet has been blocked
because, after defragmentation, there were overlapping fragments.
Fragmented packet, packet exceeds
– a packet has been blocked
because, after defragmentation, the packet exceeded.
106
SECURITY SETTINGS
06
/ CONFIGURING
verizon.com/fios
|
©
2014 Verizon. All Rights Reserved.
Page 108 / 208
Fragmented packet, packet too big
– a packet has been blocked
because, after defragmentation, the packet was too big.
FTP port request to 3rd party is forbidden
– possible bounce attack
– a packet has been blocked.
ICMP flood protection
– a broadcast ICMP (Internet Control
Message Protocol) flood.
ICMP protection
– a broadcast ICMP message has been blocked.
ICMP redirect protection
– an ICMP redirected message has been
blocked.
ICMP replay
– an ICMP replay message has been blocked.
Illegal packet options
– the options field in the packet’s header is
either illegal or forbidden.
IP Version 6
– an IPv6 packet has been accepted.
Malformed packet: Failed parsing
– a packed has been blocked
because it is malformed.
Maximum security enabled service
– a packet has been accepted
because it belongs to a permitted service in the maximum security
level.
Multicast IGMP connection
– a multicast packet has been accepted.
NAT Error: Connection pool is full - No connection created
– a
connection has not been created because the connection pool is
full.
NAT Error: Conflict mapping already exists
– a conflict occurred
because the NAT mapping already exists, so NAT failed.
SECURITY
LOG
Page 109 / 208
NAT Error: No free NAT IP
– no free NAT IP, so NAT has failed.
NAT out failed
– NAT failed for this packet.
Outbound Auth1X
– an outbound Auth1X packet has been accepted.
Packet invalid in connection
– an invalid connection packet has been
blocked.
Parental controls
– a package has been block because of parental
controls.
Passive attack on ftp-server: Client attempted to open Server ports
– a packet has been blocked.
Service
– a packet has been accepted because of a certain service,
as specified in the event type.
Spoofing protection
– a packet from the Internet with a source IP
belong to the local network has been blocked.
STP packet
– STP (Spanning Tree Protocol) packet has been
accepted/rejected.
SynCookies protection
– a SynCookies packet has been blocked.
Trusted device
– a packet from a trusted device has been accepted.
UDP flood protection
– a packed has been blocked, stopping a UDP
flood.
User authentication
– a message arrived during login time, including
both successful and failed authentication.
Wildcard connection hooked
– debug message regarding
connection.
108
SECURITY SETTINGS
06
/ CONFIGURING
verizon.com/fios
|
©
2014 Verizon. All Rights Reserved.
Page 110 / 208
Wildcard connection opened
- debug message regarding connection.
WinNuke protection
– a WinNuke attack has been blocked.
To view the security log:
1.
Select
Security Log
.
2.
To modify the types of events that display in the log, click
Settings
.
SECURITY
LOG

Rate

4.7 / 5 based on 3 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top