Cisco RV042 Administration Guide - Page 155

Logging System Statistics, Configuring, Firewall Access Rules, Log Setting - login

Page 155 highlights

Logging System Statistics Setting Up the System Log and Alerts 10 Log Setting Choose the events to report in the logs: • Alert Log: These events include common types of attacks as well as unauthorized login attempts. Check each type of attack to include in the alert log. Uncheck each event to omit from the alert log. - Syn Flooding: An attacker sends a succession of SYN packets, causing the router to open so many sessions that it is overwhelmed and denies service to legitimate traffic. - IP Spoofing: An attacker sends packets with a forged source IP address to disguise an attack as legitimate traffic. - Win Nuke: An attacker sends an Out-of-Band message to a Windows machine with the purpose of causing the target computer to crash. - Ping of Death: An attacker sends a very large IP packet with the purpose of causing the target computer to crash. - Unauthorized Login Attempt: Someone tried to log in to the router configuration utility without providing the correct username or password. - Output Blocking Event: There was an event in ProtectLink web reputation or URL filtering. • General Log: These events include actions that are performed to enforce configured policies as well as routine events such as authorized logins and configuration changes. Check each type of event to include in the general log. Uncheck each event to omit from the general log. - System Error Messages: All system error messages. - Deny Policies: Instances when the router denied access based on your Access Rules. - Allow Policies: Instances when the router allowed access based on your firewall access rules. Note that events for specific access rules can be included in the log or excluded based on the Log setting in the access rule configuration. For more information, see Configuring Firewall Access Rules, page 103. - Configuration Changes: Instances when someone saved changes in the configuration. Cisco Small Business RV0xx Series Routers Administration Guide 155

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199

Logging System Statistics
Setting Up the System Log and Alerts
Cisco Small Business RV0xx Series Routers Administration Guide
155
10
Log Setting
Choose the events to report in the logs:
Alert Log:
These events include common types of attacks as well as
unauthorized login attempts. Check each type of attack to include in the
alert log. Uncheck each event to omit from the alert log.
-
Syn Flooding:
An attacker sends a succession of SYN packets, causing
the router to open so many sessions that it is overwhelmed and denies
service to legitimate traffic.
-
IP Spoofing:
An attacker sends packets with a forged source IP address
to disguise an attack as legitimate traffic.
-
Win Nuke:
An attacker sends an Out-of-Band message to a Windows
machine with the purpose of causing the target computer to crash.
-
Ping of Death:
An attacker sends a very large IP packet with the
purpose of causing the target computer to crash.
-
Unauthorized Login Attempt:
Someone tried to log in to the router
configuration utility without providing the correct username or
password.
-
Output Blocking Event:
There was an event in ProtectLink web
reputation or URL filtering.
General Log:
These events include actions that are performed to enforce
configured policies as well as routine events such as authorized logins and
configuration changes. Check each type of event to include in the general
log. Uncheck each event to omit from the general log.
-
System Error Messages:
All system error messages.
-
Deny Policies:
Instances when the router denied access based on your
Access Rules.
-
Allow Policies:
Instances when the router allowed access based on
your firewall access rules. Note that events for specific access rules can
be included in the log or excluded based on the
Log
setting in the
access rule configuration. For more information, see
Configuring
Firewall Access Rules, page103
.
-
Configuration Changes:
Instances when someone saved changes in
the configuration.