Firewall Status - Cisco OL-4015-08 User Manual

Cisco router and security device manager user's guide
Table of Contents

Advertisement

Chapter 32
Viewing Router Information

Firewall Status

Firewall Log
OL-4015-08
MM_KEY_EXCH—The peers have exchanged Diffie-Hellman public
keys and have generated a shared secret. The ISAKMP SA remains
unauthenticated.
MM_KEY_AUTH—The ISAKMP SA has been authenticated. If the
router initiated this exchange, this state transitions immediately to
QM_IDLE and a Quick mode exchange begins.
AG_NO_STATE—The ISAKMP SA has been created but nothing else
has happened yet.
AG_INIT_EXCH—The peers have done the first exchange in Aggressive
mode but the SA is not authenticated.
AG_AUTH—The ISAKMP SA has been authenticated. If the router
initiated this exchange, this state transitions immediately to QM_IDLE
and a Quick mode exchange begins.
QM_IDLE—The ISAKMP SA is idle. It remains authenticated with its
peer and may be used for subsequent Quick mode exchanges.
Update button—Click this button to refresh the IKE SA table and display the
most current data from the router.
Clear button—Select a row in the table and click Clear to clear the IKE SA
connection.
This Firewall Status page displays the following statistics about the
configured on the router. The statistics and log entries shown in this screen are
determined by log messages generated by the firewall. In order for the firewall to
generate log entries, you must configure individual access rules to generate log
messages when they are invoked. For instructions on configuring access rules to
cause log messages, see the help topic
Whether or not the router is configured to maintain a log of connection attempts
allowed and denied by the firewall.
Cisco Router and Security Device Manager Version 2.2 User's Guide
How Do I View Activity on My Firewall?
Firewall Status
firewall
32-13

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sdm 2.2

Table of Contents