Appendix A – Disposition of Events
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 143

Admin Port Access Requests

All requests to the Administrative port (HTTPS/HTTP to the box using the WEB GUI) are logged as Admin Port Traffic.
Access requests logged as Admin Port Access requests correspond to LO1.F of Baseline module - version 4.0, ICSA Labs.
Figure 11 shows a snapshot of Admin Port Access log.

Startup History

The system startup Timestamp is logged as Startup History. Startup History corresponds to LO1.G of Baseline module -
version 4.0, ICSA Labs.
Figure 12 shows a snapshot of Startup History.

User Defined Log

User defined logging is classified as User logs. Administrators can log packets using the Packet Filers > Add User Defined
Packet Filter Rules and selecting LOG as the action.
Note: User logging is allowed only on routed packets.
Figure 13 shows a snapshot of user defined log.

Fragmented Packets Log

Fragments packets can be logged as Dropped Fragmented. Logging of Dropped Fragmented Packets can be configured
through Packet Filters > Advanced > Drop Fragmented Packets. Logging is allowed only if fragments are dropped.
Figure 14 shows a snapshot of Fragmented Packets log.

ICMP information

Information about ICMP requests is available in the remarks. Type and Code information is displayed after the event type.
ICMP information meets requirement LO2.G of Baseline module - version 4.0, ICSA Labs.
Figure 15 shows a snapshot with ICMP information.
II. Inbound Access Log

Figure 1 Inbound Access
Figure 2 Snapshot of Inbound Access Log
Description of Figure 2
The Access request originated from the source (204.26.122.9) to the destination (204.54.39.103) is accepted by the
candidate firewall. Classified as Inbound Accepted.