|
| |
| Table 56 System Maintenance Logs (continued) | |
|
|
|
| LOG MESSAGE | DESCRIPTION |
|
|
|
| Successful WEB login | Someone has logged on to the device's web configurator |
|
| interface. |
| WEB login failed | Someone has failed to log on to the device's web configurator |
|
| interface. |
| TELNET Login Successfully | Someone has logged on to the router via telnet. |
| TELNET Login Fail | Someone has failed to log on to the router via telnet. |
| Successful FTP login | Someone has logged on to the device via ftp. |
| FTP login failed | Someone has failed to log on to the device via ftp. |
| NAT Session Table is Full! | The maximum number of NAT session table entries has been |
|
| exceeded and the table is full. |
| Time initialized by Daytime | The device got the time and date from the Daytime server. |
| Server |
|
| Time initialized by Time | The device got the time and date from the time server. |
| server |
|
| Time initialized by NTP | The device got the time and date from the NTP server. |
| server |
|
| Connect to Daytime server | The device was not able to connect to the Daytime server. |
| fail |
|
| Connect to Time server fail | The device was not able to connect to the Time server. |
| Connect to NTP server fail | The device was not able to connect to the NTP server. |
| Too large ICMP packet has | The device dropped an ICMP packet that was too large. |
| been dropped |
|
| Configuration Change: PC = | The device is saving configuration changes. |
| 0x%x, Task ID = 0x%x |
|
Table 57 Access Control Logs
LOG MESSAGE | DESCRIPTION |
|
|
Firewall default policy: [ TCP | Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access |
UDP IGMP ESP GRE OSPF ] | matched the default policy and was blocked or forwarded |
<Packet Direction> | according to the default policy’s setting. |
Firewall rule [NOT] match:[ TCP | Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access |
UDP IGMP ESP GRE OSPF ] | matched (or did not match) a configured firewall rule |
<Packet Direction>, <rule:%d> | (denoted by its number) and was blocked or forwarded |
| according to the rule. |
Triangle route packet forwarded: | The firewall allowed a triangle route session to pass |
[ TCP UDP IGMP ESP GRE | through. |
OSPF ] |
|
Packet without a NAT table entry | The router blocked a packet that didn't have a |
blocked: [ TCP UDP IGMP ESP | corresponding NAT table entry. |
GRE OSPF ] |
|
Router sent blocked web site | The router sent a message to notify a user that the router |
message: TCP | blocked access to a web site that the user requested. |
Chapter 18 Logs | 186 |