Cisco RV320 Administration Manual page 109

Gigabit dual wan vpn router
Hide thumbs Also See for RV320:
Table of Contents

Advertisement

Log
System Log
Cisco RV320/RV325 Administration Guide
Configure the Logs
To trigger log entries, select the events:
Syn Flooding—TCP connections requests are being received faster than the
device can process them.
IP Spoofing—IP packets with apparently forged source IP addresses sent
with the purpose of concealing the identity of the sender or impersonating
another computing system.
Unauthorized Login Attempt—Rejected attempt to log on to the network.
Ping of Death—Detected a malformed or otherwise malicious ping sent to
a computer. A ping is normally 32 bytes in size (or 84 bytes when the
Internet Protocol [IP] header is considered); historically, many computer
systems could not handle a ping packet larger than the maximum IPv4
packet size of 65,535 bytes. Sending an oversize ping might crash the
target computer.
Win Nuke—A remote, denial-of-service attack (DoS) that affects the
Microsoft Windows 95, Microsoft Windows NT, and Microsoft Windows 3.1x
computer operating systems.
Deny Policies—Access has been denied based on configured policies.
Authorized Login—An authorized user has logged into the network.
System Error Messages—System error messages are logged.
Allow Policies—An authorized user has logged into the network through
the configured policies.
Kernel—All system kernel messages.
Configuration Changes—Instances when the device configuration has
been modified.
IPsec and PPTP VPN—VPN tunnel negotiation, connection, and
disconnection status.
SSL VPN—SSL VPN tunnel negotiation, connection, and disconnection
status.
Network—WAN/DMZ interface is connected or disconnected.
10
109

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rv325

Table of Contents