Perle Systems IOLINK-520 manual PPP Security Logs

Page 63

Event Logs

PPP Security Logs:

CHAP authentication failure so terminate link.

Generated when the CHAP authentication sent by this router in response to a request from a remote site is rejected.

CHAP failed for <remote site alias>

Generated when the remote site router failed a CHAP authentication request from this IOLINK router. The remote site name is displayed if known.

CHAP failed to complete

Generated when the remote site router sent a CHAP challenge and this IOLINK router sent a response, but no further information was received from the remote site router.

CHAP login refused by <remote site alias>

Generated when the remote site router sent a CHAP challenge and this IOLINK router sent a response, and the remote site router refused the connection. The remote site name is displayed if know.

Link X refused to authenticate

Generated when the remote site router refused to do authentication.

PAP authentication failure for user Y

Generated when the PAP password sent by this router in reply to the remote site router PAP password request is rejected.

PAP failed for <remote site alias>

Generated when the remote site router failed a PAP authentication request from this IOLINK router. The remote site name is displayed if know.

PAP X failed to complete (Y)

Generated when the remote site router sent a PAP password request and this IOLINK router sent the PAP password in reply, but no further information was received from the remote site router.

PAP X peer failed to authenticate

Generated when the remote site router did not respond to a request to authenticate.

Possible intruder <IP address> exceeded password attempts limit

A telnet connection attempt from the displayed IP address to gain access to the router management menus has tried to login over three times with incorrect passwords within the past ten minutes. This may be an attempt to gain unauthorized access to the management of this router. Any further attempts within the next ten minutes form this IP address to gain access will be rejected.

Remote Site <remote site alias> refused to authenticate

Generated when the remote router refused to do authentication for the frame relay remote site.

A.20 IOLINK-PRO & 520 Reference Manual

Image 63
Contents Reference Manual IP Routing and the IOLINK-PRO & 520 Routers IOLINK-PRO & 520 RoutersARP-Address Resolution Protocol Proxy ARPComplete IP Connection IOLINK-PRO & 520 Reference Manua Header Checksum IP Header DetailsProtocol Time to liveRedirect Icmp MessagesOptions UnreachableTime and Mask server PingUpdate Mechanism RIP-Routing Information ProtocolRoute Tables IPX Address Format IPX Routing and The IOLINK-PRO & 520 RoutersIPX Addressing Network Layer Addressing vs. MAC AddressingIPX Header Other IPX Header InformationService Advertisement Protocol Establishing an IPX ConnectionSAP Broadcasts RIP/X Operation Server TypesRouting Information Protocol SAP RequestsBridging and the IOLINK-PRO & 520 Routers RIP/X RequestsRIP/X Metrics Station Address Learning Initial Bridging ProcessAddress Purging Aging TimerAging Exception Filled Address TableIolink Router Feature Definitions TelnetLink Compression Introduction Multipoint WAN TopologiesBandwidth On Demand Point-to-PointTime of Day Connect Application Disaster Recovery Backup Link Operating Software UpgradesIsdn Single Active Link & Dual Active Link Iolink PRO & 520 Isdn Connection Management Wide Area Network Topologies SupportedCall Establishment Methods Auto-Call Time-of-Day Connections Isdn Connection ManagementManual Call Address ConnectCombination Connection ProcessInteresting Traffic Idle TimerProtocol Awareness Suspension ProcessTermination Process Session Keepalive MessagesRIP-Routing Information Protocol IP SpecificsIP Address Connect Suspension of TCP/IP SessionsIPX Serialization Frames IPX SpecificsRIP/IPX and SAP/IPX Suspension of IPX SessionsPinout Information Module IdentificationLink Clocking Information Link Interfaces Reference ATL CSU/DSU Link Module InformationConsole Pinouts T1/E1 Module CSU/DSU ModuleRS232 Link Pinouts 24 & RS232C Link PinoutsDB15 Female DTE Direction Contact Circuits From Number 11 & X.21 Link PinoutsDB25 Female DTE Direction Contact Circuit From Number Name RS442 & RS530 Link PinoutsLink Pinouts DB25Number Name 11 RS232 Null-Modem Cable RS232 Null-Modem Cable Configuration12 V.35 Null-Modem Cable Null-Modem Cable Configuration13 RS530 Null-Modem Cable RS530 Null-Modem Cable Configuration14 RS530 to RS449 Conversion Cable RS530 To RS449 Conversion Cable15 V.11/X.21 Null-Modem Cable 11/X.21 Null-Modem Cable ConfigurationWAN Link Control-Signal Operation Event logs Appendix a Event LogsEvent Logs IOLINK-PRO & 520 Reference Manual A.3 Event Logs IOLINK-PRO & 520 Reference Manual A.5 Event Logs IOLINK-PRO & 520 Reference Manual A.7 Event Logs Alarm Logs Event Logs IOLINK-PRO & 520 Reference Manual A.11 Event Logs IOLINK-PRO & 520 Reference Manual A.13 Event Logs IOLINK-PRO & 520 Reference Manual A.15 Event Logs IOLINK-PRO & 520 Reference Manual A.17 Event Logs IOLINK-PRO & 520 Reference Manual A.19 PPP Security Logs Security MAC Address FilteringSecurity-Filter if Destination Programmable FilteringSecurity-Filter if Source Security-Forward if Destination Security-Forward if Source Programmable Filtering Pattern Filter Operators Bridge Pattern FilteringProtocol Discrimination IP, and no more Protocol Type FieldInternet Protocol IP Filter all IP PacketsFilter all except TCP/IP Transport Control Protocol / Internet Protocol TCP/IPFilter only TCP/IP Filter all IP without TCP trafficEthernet Multicasting Bandwidth ConservationFilter all DEC Ethernet BroadcastingGeneral Restrictions Internet AddressesEthernet Station Addresses Mask would be 6-010203040506&12-0800&23-06 Example Mask CombinationsIPX Router Pattern Filtering IP Router Pattern FilteringPage Appendix C Frame Formats Octet Locations on an IP Routed TCP/IP Frame IOLINK-PRO & 520 Reference Manual C.3