EasyManua.ls Logo

Cisco RV320 - Page 109

Cisco RV320
122 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Log
System Log
Cisco RV320/RV325 Administration Guide 109
10
Configure the Logs
To trigger log entries, select the events:
Syn FloodingTCP connections requests are being received faster than the
device can process them.
IP Spoofing—IP packets with apparently forged source IP addresses sent
with the purpose of concealing the identity of the sender or impersonating
another computing system.
Unauthorized Login Attempt—Rejected attempt to log on to the network.
Ping of Death—Detected a malformed or otherwise malicious ping sent to
a computer. A ping is normally 32 bytes in size (or 84 bytes when the
Internet Protocol [IP] header is considered); historically, many computer
systems could not handle a ping packet larger than the maximum IPv4
packet size of 65,535 bytes. Sending an oversize ping might crash the
target computer.
Win Nuke—A remote, denial-of-service attack (DoS) that affects the
Microsoft Windows 95, Microsoft Windows NT, and Microsoft Windows 3.1x
computer operating systems.
Deny Policies—Access has been denied based on configured policies.
Authorized Login—An authorized user has logged into the network.
System Error Messages—System error messages are logged.
Allow Policies—An authorized user has logged into the network through
the configured policies.
Kernel—All system kernel messages.
Configuration Changes—Instances when the device configuration has
been modified.
IPsec and PPTP VPNVPN tunnel negotiation, connection, and
disconnection status.
SSL VPN—SSL VPN tunnel negotiation, connection, and disconnection
status.
NetworkWAN/DMZ interface is connected or disconnected.

Table of Contents

Other manuals for Cisco RV320

Related product manuals