Ipv6 Logging - Cisco QuickVPN - PC Administration Manual

Sa 500 series security appliances administration guide
Hide thumbs Also See for QuickVPN - PC:
Table of Contents

Advertisement

Administration
Configuring the Logging Options
STEP 3
STEP 1
STEP 2
Cisco SA 500 Series Security Appliances Administration Guide
-
Source MAC Filter: If checked, logs packets matched due to source
MAC filtering. Uncheck to disable source MAC filtering logs.
-
Output Blocking Event Log: If checked, the device displays logs for
packets blocked by the ProtectLink service.
-
Bandwidth Limit: If checked, displays logs related to packets dropped
due to Bandwidth Limiting.
Click Apply to save your settings, or click Reset to revert to the saved settings.

IPv6 Logging

This page allows enabling logging rules for IPv6 traffic logging.
Click Administration on the menu bar, and then click Logging > IPv6 Logging in
the navigation tree.
The IPV6 Logging page appears.
Check the box for each logging option that you want to enable, or uncheck the box
to disable the specified logging option.
Accepted Packets: This logs packets that were successfully transferred
through the segment. This option is useful when the Default Outbound Policy
is "Block Always" (see the Firewall Rules page under the Firewall menu).
For example, let's say that you want a record of every successful SSH
connection from the LAN to the WAN. You would check the LAN to WAN box
under Accepted Packets. Whenever a LAN machine makes an SSH
connection to the WAN, a message is logged. (This example assumes that
your default outbound policy is "Block Always" and you have enabled a
firewall rule to allow SSH traffic from the LAN to the WAN. The firewall rule
also must allow logging. For more information, see
Rules to Control Inbound and Outbound Traffic, page
Dropped Packets: Logs packets that were blocked from being transferred
through the segment. This option is useful when the Default Outbound Policy
is "Allow Always" (see the Firewall Rules page under the Firewall menu).
For example, let's say that you want a record of every blocked SSH
connection from the LAN to the WAN. You would check the LAN to WAN box
under Dropped Packets. Whenever a machine on the LAN attempts to make
an SSH connection to the WAN, a message is logged. This example assumes
9
Configuring Firewall
121.)
209

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents