Configuration manual

316 Appendix J Log descriptions
NN47923-501
Firewall rule match: GRE
(set:%d, rule:%d)
GRE access matched the listed firewall rule and the
Business Secure Router blocked or forwarded it according
to the rule’s configuration.
Firewall rule match:
OSPF (set:%d, rule:%d)
OSPF access matched the listed a firewall rule and the
Business Secure Router blocked or forwarded it according
to the rule’s configuration.
Firewall rule match:
(set:%d, rule:%d)
Access matched the listed firewall rule and the Business
Secure Router blocked or forwarded it according to the
rule’s configuration.
Firewall rule NOT match:
TCP (set:%d, rule:%d)
TCP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
UDP (set:%d, rule:%d)
UDP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
ICMP (set:%d, rule:%d,
type:%d, code:%d)
ICMP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
IGMP (set:%d, rule:%d)
IGMP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
ESP (set:%d, rule:%d)
ESP access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
GRE (set:%d, rule:%d)
GRE ac access did not match the listed firewall rule and
the Business Secure Router logged it.
Firewall rule NOT match:
OSPF (set:%d, rule:%d)
OSPF access did not match the listed firewall rule and the
Business Secure Router logged it.
Firewall rule NOT match:
(set:%d, rule:%d)
Access did not match the listed firewall rule and the
Business Secure Router logged it.
Filter default policy
DROP!
IP address or protocol matched a default filter policy and
the Business Secure Router dropped the packet to block
access.
Filter default policy
FORWARD!
IP address or protocol matched a default filter policy.
Access was allowed and the router forwarded the packet.
Filter match DROP <set
%d/rule %d>
IP address or protocol matched the listed filter rule and the
Business Secure Router dropped the packet to block
access.
Filter match FORWARD
<set %d/rule %d>
IP address or protocol matched the listed filter rule. Access
was allowed and the router forwarded the packet.
Table 81 Access logs
Log Message Description