EasyManuals Logo

Cisco RV082 - Small Business VPN Router User Manual

Cisco RV082 - Small Business VPN Router
199 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #155 background imageLoading...
Page #155 background image
Logging System Statistics
Setting Up the System Log and Alerts
Cisco Small Business RV0xx Series Routers Administration Guide 155
10
Log Setting
Choose the events to report in the logs:
Alert Log: These events include common types of attacks as well as
unauthorized login attempts. Check each type of attack to include in the
alert log. Uncheck each event to omit from the alert log.
- Syn Flooding: An attacker sends a succession of SYN packets, causing
the router to open so many sessions that it is overwhelmed and denies
service to legitimate traffic.
- IP Spoofing: An attacker sends packets with a forged source IP address
to disguise an attack as legitimate traffic.
- Win Nuke: An attacker sends an Out-of-Band message to a Windows
machine with the purpose of causing the target computer to crash.
- Ping of Death: An attacker sends a very large IP packet with the
purpose of causing the target computer to crash.
- Unauthorized Login Attempt: Someone tried to log in to the router
configuration utility without providing the correct username or
password.
- Output Blocking Event: There was an event in ProtectLink web
reputation or URL filtering.
General Log: These events include actions that are performed to enforce
configured policies as well as routine events such as authorized logins and
configuration changes. Check each type of event to include in the general
log. Uncheck each event to omit from the general log.
- System Error Messages: All system error messages.
- Deny Policies: Instances when the router denied access based on your
Access Rules.
- Allow Policies: Instances when the router allowed access based on
your firewall access rules. Note that events for specific access rules can
be included in the log or excluded based on the Log setting in the
access rule configuration. For more information, see Configuring
Firewall Access Rules, page 103.
- Configuration Changes: Instances when someone saved changes in
the configuration.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco RV082 - Small Business VPN Router and is the answer not in the manual?

Cisco RV082 - Small Business VPN Router Specifications

General IconGeneral
VPN Tunnels50
DHCP ServerYes
AuthenticationMD5, SHA1
Power Supply12V DC, 1A
Humidity10% to 85% non-condensing
LAN Ports8 x 10/100 Mbps RJ-45
VPN ProtocolsIPSec, PPTP, L2TP
FirewallSPI
EncryptionDES, 3DES, AES
Memory8 MB Flash, 32 MB DRAM
Operating Temperature0 to 40°C
Storage Temperature-4 to 158°F (-20 to 70°C)
Weight0.69 kg

Related product manuals