Avaya Business Secure Router 252 Configuration - Basics Uživatelský manuál Strana 437

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 460
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 436
Appendix B Log Descriptions 437
Nortel Business Secure Router 252 Configuration — Basics
Filter default policy
DROP!
Access matched a default filter policy (denied LAN IP) and
the Business Secure Router dropped the packet to block
access.
Filter default policy
FORWARD!
TCP access matched a default filter policy. Access was
allowed and the router forwarded the packet.
Filter default policy
FORWARD!
UDP access matched a default filter policy. Access was
allowed and the router forwarded the packet.
Filter default policy
FORWARD!
ICMP access matched a default filter policy. Access was
allowed and the router forwarded the packet.
Filter default policy
FORWARD!
Access matched a default filter policy. Access was allowed
and the router forwarded the packet.
Filter default policy
FORWARD!
Access matched a default filter policy (denied LAN IP).
Access was allowed and the router forwarded the packet.
Filter match DROP
<set %d/rule %d>
TCP access matched the listed filter rule and the Business
Secure Router dropped the packet to block access.
Filter match DROP
<set %d/rule %d>
UDP access matched the listed filter rule and the Business
Secure Router dropped the packet to block access.
Filter match DROP
<set %d/rule %d>
ICMP access matched the listed filter rule and the
Business Secure Router dropped the packet to block
access.
Filter match DROP
<set %d/rule %d>
Access matched the listed filter rule and the Business
Secure Router dropped the packet to block access.
Filter match DROP
<set %d/rule %d>
Access matched the listed filter rule (denied LAN IP) and
the Business Secure Router dropped the packet to block
access.
Filter match FORWARD
<set %d/rule %d>
TCP access matched the listed filter rule. Access was
allowed and the router forwarded the packet.
Filter match FORWARD
<set %d/rule %d>
UDP access matched the listed filter rule. Access was
allowed and the router forwarded the packet.
Filter match FORWARD
<set %d/rule %d>
ICMP access matched the listed filter rule. Access was
allowed and the router forwarded the packet.
Filter match FORWARD
<set %d/rule %d>
Access matched the listed filter rule. Access was allowed
and the router forwarded the packet.
Filter match FORWARD
<set %d/rule %d>
Access matched the listed filter rule (denied LAN IP).
Access was allowed and the router forwarded the packet.
Table 128 Access Logs
Log Message Description
Zobrazit stránku 436
1 2 ... 432 433 434 435 436 437 438 439 440 441 442 ... 459 460

Komentáře k této Příručce

Žádné komentáře