Firewall Log; Call-Triggering Packet; Figure 79 Call-Triggering Packet Example - Nortel BCM50e Configuration

Integrated router
Table of Contents

Advertisement

Firewall log

Firewall Log Message Format
SdcmdSyslogSend(SYSLOG_FIREWALL, SYSLOG_NOTICE, buf);
buf = IP[Src=xx.xx.xx.xx : spo=xxxx Dst=xx.xx.xx.xx : dpo=xxxx | prot |
rule | action]
Src: Source Address
spo: Source port (empty means no source port information)
Dst: Destination Address
dpo: Destination port (empty means no destination port information)
prot: Protocol ("TCP","UDP","ICMP", "IGMP", "GRE", "ESP")
rule: <a,b> where a means "set" number; b means "rule" number.
Action: nothing(N) block (B) forward (F)
08-01-2000 11:48:41 Local1.Notice 192.168.10.10 RAS: FW 172.21.1.80 :137
->172.21.1.80 :137 |UDP|default permit:<2,0>|B
08-01-2000 11:48:41 Local1.Notice 192.168.10.10 RAS: FW 192.168.77.88
:520 ->192.168.77.88 :520 |UDP|default permit:<2,0>|B
08-01-2000 11:48:39 Local1.Notice 192.168.10.10 RAS: FW 172.21.1.50
->172.21.1.50 |IGMP<2>|default permit:<2,0>|B
08-01-2000 11:48:39 Local1.Notice 192.168.10.10 RAS: FW 172.21.1.25
->172.21.1.25 |IGMP<2>|default permit:<2,0>|B

Call-Triggering packet

Call-Triggering Packet displays information about the packet that triggered a
dial-out call in an easily readable format. Equivalent information is available in
menu 24.1 in hex format. An example is shown in

Figure 79 Call-Triggering packet example

IP Frame: ENET0-RECV Size: 44/ 44 Time: 17:02:44.262
Frame Type:
IP Header:
IP Version = 4
Header Length = 20
Type of Service = 0x00 (0)
Total Length = 0x002C (44)
Identification = 0x0002 (2)
Chapter 14 System information and diagnosis 155
BCM50e Integrated Router Configuration - Advanced
Figure
79.

Advertisement

Table of Contents
loading

Table of Contents