Log
System Log
Cisco RV320/RV325 Administration Guide
109
10
Configure the Logs
To trigger log entries, select the events:
•
Syn Flooding
—TCP connections requests are being received faster than the
device can process them.
•
IP Spoofing
—IP packets with apparently forged source IP addresses sent
with the purpose of concealing the identity of the sender or impersonating
another computing system.
•
Unauthorized Login Attempt
—Rejected attempt to log on to the network.
•
Ping of Death
—Detected a malformed or otherwise malicious ping sent to
a computer. A ping is normally 32 bytes in size (or 84 bytes when the
Internet Protocol [IP] header is considered); historically, many computer
systems could not handle a ping packet larger than the maximum IPv4
packet size of 65,535 bytes. Sending an oversize ping might crash the
target computer.
•
Win Nuke
—A remote, denial-of-service attack (DoS) that affects the
Microsoft Windows 95, Microsoft Windows NT, and Microsoft Windows 3.1x
computer operating systems.
•
Deny Policies
—Access has been denied based on configured policies.
•
Authorized Login
—An authorized user has logged into the network.
•
System Error Messages
—System error messages are logged.
•
Allow Policies
—An authorized user has logged into the network through
the configured policies.
•
Kernel
—All system kernel messages.
•
Configuration Changes
—Instances when the device configuration has
been modified.
•
IPsec and PPTP VPN
—VPN tunnel negotiation, connection, and
disconnection status.
•
SSL VPN
—SSL VPN tunnel negotiation, connection, and disconnection
status.
•
Network
—WAN/DMZ interface is connected or disconnected.
Summary of Contents for Small Business RV320
Page 1: ...Cisco RV320 RV325 Gigabit Dual WAN VPN Router ADMINISTRATION GUIDE ...
Page 2: ...78 20928 01 ...
Page 10: ...Getting Started Features of the User Interface 10 Cisco RV320 RV325 Administration Guide 1 ...
Page 16: ...System Summary Log Setting Status 16 Cisco RV320 RV325 Administration Guide 2 ...
Page 54: ...DHCP Router Advertisement IPv6 54 Cisco RV320 RV325 Administration Guide 4 ...
Page 68: ...System Management Backup and Restore 68 Cisco RV320 RV325 Administration Guide 5 ...
Page 74: ...Port Management 802 1X Configuration 74 Cisco RV320 RV325 Administration Guide 6 ...
Page 80: ...Firewall Content Filter 80 Cisco RV320 RV325 Administration Guide 7 ...
Page 106: ...Certificate Management CSR Authorization 106 Cisco RV320 RV325 Administration Guide 9 ...
Page 118: ...Wizard 118 Cisco RV320 RV325 Administration Guide 12 ...
Page 122: ...Where to Go From Here 122 Cisco RV320 RV325 Administration Guide 14 Revised August 2014 ...