D-Link DSR-150 DSR-150 User Manual - Page 165

Local1-UTM: This facility corresponds to IPS Intrusion Prevention System

Page 165 highlights

Unified Services Router User Manual  Kern el: Th is refers t o t h e Lin u x kern el. Lo g mes s ag es t h at co rres p o n d t o t h is facility would corres pond to traffic through the firewall or network s tack.  Sy s t em: Th is refers t o ap plicat ion an d man ag emen t lev el feat ures av ailab le o n this ro u t er, in clu d in g SSL VPN an d ad min is t rat o r ch an g es fo r man ag in g t h e u n it .  W ireles s : This facility corres ponds to the 802.11 driver us ed for providing AP functionality to your network.  Lo cal1-UTM : Th is facilit y co rres p o n d s t o IPS (In t ru s io n Prev en t io n Sy s t em) wh ich h elp s in d et ect in g malicio u s in t ru s io n at t emp t s fro m t h e W A N. For each facility, the following events (in order of s everity) can be logged: Emerg en cy , A lert , Crit ical, Erro r , W arn in g , No t ificat io n , In fo rmat io n , Deb u g g in g . W hen a particular s everity level is s elected, all events with s everity equal to and g reat er t h an t h e ch osen s ev erit y are cap t u red . Fo r examp le if y o u h av e co n fig u red CRITICAL level logging for the W ireles s facility , then 802.11 logs with s everities CRITICA L, A LERT, an d EM ERGENCY are lo g g ed . Th e s ev erit y lev els av ailab le for logging are:  EM ERGENC Y: s y s t em is u n u s ab le  A LERT: act io n mu s t b e t aken immed iat ely  CRITICA L: crit ical co n d it io n s  ERROR: erro r co n d it io n s  W A RNING: warn in g co n d it io n s  NOTIFICA TION: n o rmal b u t s ig n ifican t co n d it io n  INFORM A TION: in fo rmat io n al  DEBUGGIN G: d eb u g -lev el mes s ag es 163

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270

Unified Services Router
User Manual
163
Kernel: This refers to the Linux kernel. Log messages that correspond to this
facility would correspond to traffic through the firewall or network stack.
System: This refers to application and management level features available on this
router, including SSL VPN and administrator changes for managing the unit.
Wireless: This facility corresponds to the 802.11 driver used for providing AP
functionality to your network.
Local1-UTM: This facility corresponds to IPS (Intrusion Prevention System)
which helps in detecting malicious intrusion attempts from the WAN.
For each facility, the following events (in order of severity) can be logged:
Emergency, Alert, Critical, Error, Warning, Notification, Information, Debugging.
When a particular severity level is selected, all events with severity equal to and
greater than the chosen severity are captured. For example if you have configured
CRITICAL level logging for the Wireless facility, then 802.11 logs with severities
CRITICAL, ALERT, and EMERGENCY are logged. The severity levels available
for logging are:
EMERGENCY: system is unusable
ALERT: action must be taken immediately
CRITICAL: critical conditions
ERROR: error conditions
WARNING: warning conditions
NOTIFICATION: normal but significant condition
INFORMATION: informational
DEBUGGING: debug-level messages