EasyManuals Logo
Home>Cisco>Network Router>RV042G

Cisco RV042G Administration Guide

Cisco RV042G
199 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #155 background imageLoading...
Page #155 background image
Logging System Statistics
Setting Up the System Log and Alerts
Cisco Small Business RV0xx Series Routers Administration Guide 155
10
Log Setting
Choose the events to report in the logs:
Alert Log: These events include common types of attacks as well as
unauthorized login attempts. Check each type of attack to include in the
alert log. Uncheck each event to omit from the alert log.
- Syn Flooding: An attacker sends a succession of SYN packets, causing
the router to open so many sessions that it is overwhelmed and denies
service to legitimate traffic.
- IP Spoofing: An attacker sends packets with a forged source IP address
to disguise an attack as legitimate traffic.
- Win Nuke: An attacker sends an Out-of-Band message to a Windows
machine with the purpose of causing the target computer to crash.
- Ping of Death: An attacker sends a very large IP packet with the
purpose of causing the target computer to crash.
- Unauthorized Login Attempt: Someone tried to log in to the router
configuration utility without providing the correct username or
password.
- Output Blocking Event: There was an event in ProtectLink web
reputation or URL filtering.
General Log: These events include actions that are performed to enforce
configured policies as well as routine events such as authorized logins and
configuration changes. Check each type of event to include in the general
log. Uncheck each event to omit from the general log.
- System Error Messages: All system error messages.
- Deny Policies: Instances when the router denied access based on your
Access Rules.
- Allow Policies: Instances when the router allowed access based on
your firewall access rules. Note that events for specific access rules can
be included in the log or excluded based on the Log setting in the
access rule configuration. For more information, see Configuring
Firewall Access Rules, page 103.
- Configuration Changes: Instances when someone saved changes in
the configuration.

Table of Contents

Other manuals for Cisco RV042G

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco RV042G and is the answer not in the manual?

Cisco RV042G Specifications

General IconGeneral
Ethernet LANYes
Cabling technology10/100/1000Base-T(X)
Networking standardsIEEE 802.1D, IEEE 802.1p, IEEE 802.1Q, IEEE 802.1x, IEEE 802.3, IEEE 802.3ab, IEEE 802.3az, IEEE 802.3u
Ethernet LAN data rates10, 100, 1000 Mbit/s
Ethernet interface typeGigabit Ethernet
Ethernet LAN (RJ-45) ports6
Routing protocolsIP, RIP-1, RIP-2
Supported network protocolsPPTP, L2TP, IPSec, PPPoE, DHCP
VPN supportPPTP, Layer 2 Tunneling Protocol (L2TP), IPsec, Dead peer detection (DPD), Internet Key Exchange (IKE), split DNS, VPN backup
Firewall securityStateful packet inspection (SPI) firewall
Security algorithms3DES, 128-bit AES, 192-bit AES, 256-bit AES, DES, HTTPS, IPSEC
VPN tunnels quantity50
Authentication methodSHA-1, MD5
MAC address filtering-
CertificationFCC Class B, CE Class B, UL, cUL, CB
Input current1 A
Output voltage12 V
Storage temperature (T-T)0 - 70 °C
Operating temperature (T-T)0 - 40 °C
Storage relative humidity (H-H)5 - 90 %
Operating relative humidity (H-H)10 - 85 %
Product colorBlack
Rack mountingNo
Weight and Dimensions IconWeight and Dimensions
Depth200 mm
Width130 mm
Height38.5 mm
Weight600 g

Related product manuals