D-Link NetDefend SOHO DFL-160 User Manual page 109

Netdefend soho utm firewall
Hide thumbs Also See for NetDefend SOHO DFL-160:
Table of Contents

Advertisement

CfgLog
Shows the contents of the most recently used buffer.
Example:
DFL-160:/> buff .
Decode of buffer number 1059
lan: Enet 0050:dadf:7bbf > 0003:325c:cc00 type 0x0800 len 1058
IP 192.168.123.10 -> 193.13.79.1 IHL:20
DataLen:1024 TTL:254 Proto:ICMP
ICMP Echo reply ID:6666 Seq:0
CfgLog
Shows the results of the most recent reconfiguration or start up of the firewall. This text is the same
as is shown on-screen during reconfiguration or start up.
Syntax: cfglog
Example:
DFL-160:/> cfglog
Configuration log:
Configuring from FWCore_N.cfg
Configuration done
Configuration "FWCore_N.cfg" (v153)
verified for bi-directional communication
Connections
Shows the last 20 connections opened through the DFL-160. Connections are created when traffic is
permitted to pass via Allow or NAT rules. Traffic permitted to pass under FwdFast is not included
in this list. Each connection has two timeout values, one in each direction. These are updated when
the firewall receives packets from each end of the connection. The value shown in the Timeout
column is the lower of the two values.
Possible values in the State column include:
SYN_RECV TCP packet with SYN flag received.
SYNACK_S TCP packet with SYN + ACK flags sent.
ACK_RECV TCP packet with ACK flag received.
TCP_OPEN TCP packet with ACK flag sent.
FIN_RECV TCP packet with FIN / RST flag received.
PING The connection is an ICMP ECHO connection.
UDP The connection is a UDP connection.
RAWIP The connection uses an IP protocol other than TCP, UDP or ICMP.
Syntax: connections
Example:
DFL-160:/> conn
State Prot Source Destination Time
TCP_OPEN TCP wan:60.20.37.6:5432 dmz:wwwsrv:80 3600
SYN_RECV TCP wan:60.20.37.6:5433 dmz:wwwsrv:80 30
UDP_OPEN UDP lan:10.5.3.2:5433 dmz:dnssrv:53 50
Crashdump
109
Appendix A. CLI Reference

Advertisement

Table of Contents
loading

Table of Contents