Avaya Business Secure Router 252 Configuration - Basics Manual de usuario Pagina 437

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 460
  • Tabla de contenidos
  • SOLUCIÓN DE PROBLEMAS
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 436
Appendix B Log Descriptions 437
Nortel Business Secure Router 252 Configuration — Basics
Filter default policy
DROP!
Access matched a default filter policy (denied LAN IP) and
the Business Secure Router dropped the packet to block
access.
Filter default policy
FORWARD!
TCP access matched a default filter policy. Access was
allowed and the router forwarded the packet.
Filter default policy
FORWARD!
UDP access matched a default filter policy. Access was
allowed and the router forwarded the packet.
Filter default policy
FORWARD!
ICMP access matched a default filter policy. Access was
allowed and the router forwarded the packet.
Filter default policy
FORWARD!
Access matched a default filter policy. Access was allowed
and the router forwarded the packet.
Filter default policy
FORWARD!
Access matched a default filter policy (denied LAN IP).
Access was allowed and the router forwarded the packet.
Filter match DROP
<set %d/rule %d>
TCP access matched the listed filter rule and the Business
Secure Router dropped the packet to block access.
Filter match DROP
<set %d/rule %d>
UDP access matched the listed filter rule and the Business
Secure Router dropped the packet to block access.
Filter match DROP
<set %d/rule %d>
ICMP access matched the listed filter rule and the
Business Secure Router dropped the packet to block
access.
Filter match DROP
<set %d/rule %d>
Access matched the listed filter rule and the Business
Secure Router dropped the packet to block access.
Filter match DROP
<set %d/rule %d>
Access matched the listed filter rule (denied LAN IP) and
the Business Secure Router dropped the packet to block
access.
Filter match FORWARD
<set %d/rule %d>
TCP access matched the listed filter rule. Access was
allowed and the router forwarded the packet.
Filter match FORWARD
<set %d/rule %d>
UDP access matched the listed filter rule. Access was
allowed and the router forwarded the packet.
Filter match FORWARD
<set %d/rule %d>
ICMP access matched the listed filter rule. Access was
allowed and the router forwarded the packet.
Filter match FORWARD
<set %d/rule %d>
Access matched the listed filter rule. Access was allowed
and the router forwarded the packet.
Filter match FORWARD
<set %d/rule %d>
Access matched the listed filter rule (denied LAN IP).
Access was allowed and the router forwarded the packet.
Table 128 Access Logs
Log Message Description
Vista de pagina 436
1 2 ... 432 433 434 435 436 437 438 439 440 441 442 ... 459 460

Comentarios a estos manuales

Sin comentarios