Log

10

 

System Log

 

 

 

 

 

Configure the Logs

To trigger log entries, select the events:

Syn Flooding—TCP connections requests are being received faster than the device can process them.

IP Spoofing—IP packets with apparently forged source IP addresses sent with the purpose of concealing the identity of the sender or impersonating another computing system.

Unauthorized Login Attempt—Rejected attempt to log on to the network.

Ping of Death—Detected a malformed or otherwise malicious ping sent to a computer. A ping is normally 32 bytes in size (or 84 bytes when the Internet Protocol [IP] header is considered); historically, many computer systems could not handle a ping packet larger than the maximum IPv4 packet size of 65,535 bytes. Sending an oversize ping might crash the target computer.

Win Nuke—A remote, denial-of-service attack (DoS) that affects the Microsoft Windows 95, Microsoft Windows NT, and Microsoft Windows 3.1x computer operating systems.

Deny Policies—Access has been denied based on configured policies.

Authorized Login—An authorized user has logged into the network.

System Error Messages—System error messages are logged.

Allow Policies—An authorized user has logged into the network through the configured policies.

Kernel—All system kernel messages.

Configuration Changes—Instances when the device configuration has been modified.

IPsec and PPTP VPN—VPN tunnel negotiation, connection, and disconnection status.

SSL VPN—SSL VPN tunnel negotiation, connection, and disconnection status.

Network—WAN/DMZ interface is connected or disconnected.

Cisco Small Business RV320/RV325 Administration Guide

109

Page 109
Image 109
Cisco Systems RV325K9NA, RV320K9NA manual Configure the Logs