EasyManua.ls Logo

Turin Networks Adit 3000 Series and Multi-Service Router (MSR) Card none - Security-Log

Default Icon
496 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
4-58 Adit 3000 (Rel. 1.6) and MSR Card (Rel 2.0) CLI
Global Configuration Mode
Global Configuration Commands
security-log
Use the security-log command to configure the security policy. To delete a security policy, see no
security-log command on page 4-49.
Syntax: (config)# security-log setting enable
Example: (config)# security-log accepted-out-connection enable
Supported Platforms:
Adit 3104, Adit 3200, Adit 3500, MSR
Field Definition
Accepted Events
accepted-in-connections Sessions originated from the Internet that have been allowed by
the firewall.
accepted-out-
connections
Sessions originated from the network that have been allowed by
the firewall.
Blocked Events
blocked-conn-attempts Sessions that have been blocked by the firewall.
blocked-fragments Detection of fragmented packets when Block IP Fragments is
enabled.
defrag-error Detection of fragmented packets that cannot be properly
reassembled.
echo-chargen Detection of the Echo or Chargen DOS attacks.
icmp-flood Detection of an ICMP flood DOS attack.
icmp-multicast Detection of multicast ICMP packets, such as a ping to a subnet
broadcast address.
icmp-redirect Detection of improper ICMP redirect messages from the WAN.
icmp-replay Detection of an ICMP Replay DOS attack.
multicast-broadcast Detection of the Multicast or broadcast packets arriving at the
WAN interface.
pkt-illegal-opts Detection of IP packets with disallowed IP options: lsrr, ssrr, rr,
timestamp, or error options.
spoofed-connection Detection of IP address spoofing attacks.
syn-flood Detection of the Syn Flood DOS attack.
udp-flood Detection of a UDP Flood attack.
winnuke Detection of the Winnuke DOS attack.
Other Events
connection-states Session connection state detail.
rem-admin-attempts Management sessions established.
Log Buffer
prevent-log-overrun Stop logging firewall detail when the log is full. This prevents
loosing early log entries, but will drop the later log entries.

Table of Contents