Carrier Access none manual Security-log

Models: none

1 496
Download 496 pages 60.9 Kb
Page 184
Image 184

Global Configuration Mode

Global Configuration Commands

security-log

Use the security-logcommand to configure the security policy. To delete a security policy, see no security-logcommand on page 4-49.

Syntax: (config)# security-log setting enable

Field

Definition

Accepted Events

 

 

 

accepted-in-connections

Sessions originated from the Internet that have been allowed by

 

the firewall.

 

 

accepted-out-

Sessions originated from the network that have been allowed by

connections

the firewall.

 

 

Blocked Events

 

 

 

blocked-conn-attempts

Sessions that have been blocked by the firewall.

 

 

blocked-fragments

Detection of fragmented packets when Block IP Fragments is

 

enabled.

 

 

defrag-error

Detection of fragmented packets that cannot be properly

 

reassembled.

 

 

echo-chargen

Detection of the Echo or Chargen DOS attacks.

 

 

icmp-flood

Detection of an ICMP flood DOS attack.

 

 

icmp-multicast

Detection of multicast ICMP packets, such as a ping to a subnet

 

broadcast address.

 

 

icmp-redirect

Detection of improper ICMP redirect messages from the WAN.

 

 

icmp-replay

Detection of an ICMP Replay DOS attack.

 

 

multicast-broadcast

Detection of the Multicast or broadcast packets arriving at the

 

WAN interface.

 

 

pkt-illegal-opts

Detection of IP packets with disallowed IP options: lsrr, ssrr, rr,

 

timestamp, or error options.

 

 

spoofed-connection

Detection of IP address spoofing attacks.

 

 

syn-flood

Detection of the Syn Flood DOS attack.

 

 

udp-flood

Detection of a UDP Flood attack.

 

 

winnuke

Detection of the Winnuke DOS attack.

 

 

Other Events

 

 

 

connection-states

Session connection state detail.

 

 

rem-admin-attempts

Management sessions established.

 

 

Log Buffer

 

 

 

prevent-log-overrun

Stop logging firewall detail when the log is full. This prevents

 

loosing early log entries, but will drop the later log entries.

 

 

Example: (config)# security-log accepted-out-connection enable

Supported Platforms: Adit 3104, Adit 3200, Adit 3500, MSR

4-58

Adit 3000 (Rel. 1.6) and MSR Card (Rel 2.0) CLI

Page 184
Image 184
Carrier Access none manual Security-log