Multi-Tech Systems RF660 User Manual

Page 141

Advertising
background image

Appendix A – Disposition of Events

Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D)

141

Appendix A – Disposition of Events for
the RouteFinder v3.2x


For ICSA Certification

Based on

The Modular Firewall Certification Criteria

Baseline module - version 4.0

Revision History

Date Revision

Remarks/Changes

16-Aug-2004 R1

Baseline

document

Table of Contents

1. Abstract.......................................................................................................................................................... 142

II. Inbound Access Log ..................................................................................................................................... 143

III. Outbound Access Log ................................................................................................................................. 145

IV. Access Requests through Firewall Dropped ............................................................................................ 146

V. Access Requests to Firewall Dropped ....................................................................................................... 146

VI. Administrative Authentication Logs .......................................................................................................... 147

VII. Admin Port Access Log ............................................................................................................................. 147

VIII. Startup History Log ................................................................................................................................... 147

IX. User Log........................................................................................................................................................ 147

X. Fragmented Dropped Log ............................................................................................................................ 147

XI. ICMP Information ......................................................................................................................................... 148

Table of Figures

Figure 1 – Inbound Access

143

Figure 2 – Snapshot of Inbound Access Log

143

Figure 3 – Inbound Access (DNAT with Connection Tracking)

144

Figure 4 – Outbound Access

145

Figure 5 – Snapshot of Outbound Access Log

145

Figure 6 – Snapshot of Outbound Access Log (with Connection Tracking) 145

Figure 7 – Snapshot of Through Firewall Dropped Log

146

Figure 8 – Access Requests to Firewall Dropped

146

Figure 9 – Snapshot of To Firewall Dropped Log

146

Figure 10 – Snapshot of Administrative Authentication Log

147

Figure 11 – Snapshot of Admin Port Access Log

147

Figure 12 – Snapshot of Startup History

147

Figure 13 – Snapshot of User Log

147

Figure 14 – Snapshot of Fragmented Dropped Log

147

Figure 15 – Snapshot of Log with ICMP Information

148

Advertising
This manual is related to the following products: