Multi-Tech Systems RF660 User Manual

Page of 189
Appendix A – Disposition of Events  
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 
141 
 
 
Appendix A – Disposition of Events for 
the RouteFinder v3.2x 
 
 
For ICSA Certification  
Based on 
The Modular Firewall Certification Criteria 
Baseline module - version 4.0 
 
Revision History 
Date Revision 
Remarks/Changes 
16-Aug-2004 R1 
Baseline 
document 
 
Table of Contents 
1. Abstract.......................................................................................................................................................... 142
 
II. Inbound Access Log ..................................................................................................................................... 143
 
III. Outbound Access Log ................................................................................................................................. 145
 
IV. Access Requests through Firewall Dropped ............................................................................................ 146
 
V. Access Requests to Firewall Dropped ....................................................................................................... 146
 
VI. Administrative Authentication Logs .......................................................................................................... 147
 
VII. Admin Port Access Log ............................................................................................................................. 147
 
VIII. Startup History Log ................................................................................................................................... 147
 
IX. User Log........................................................................................................................................................ 147
 
X. Fragmented Dropped Log ............................................................................................................................ 147
 
XI. ICMP Information ......................................................................................................................................... 148
 
 
Table of Figures 
Figure 1 – Inbound Access 
143
 
Figure 2 – Snapshot of Inbound Access Log 
143
 
Figure 3 – Inbound Access (DNAT with Connection Tracking) 
144
 
Figure 4 – Outbound Access 
145
 
Figure 5 – Snapshot of Outbound Access Log 
145
 
Figure 6 – Snapshot of Outbound Access Log (with Connection Tracking)  145
 
Figure 7 – Snapshot of Through Firewall Dropped Log 
146
 
Figure 8 – Access Requests to Firewall Dropped 
146
 
Figure 9 – Snapshot of To Firewall Dropped Log 
146
 
Figure 10 – Snapshot of Administrative Authentication Log 
147
 
Figure 11 – Snapshot of Admin Port Access Log 
147
 
Figure 12 – Snapshot of Startup History 
147
 
Figure 13 – Snapshot of User Log 
147
 
Figure 14 – Snapshot of Fragmented Dropped Log 
147
 
Figure 15 – Snapshot of Log with ICMP Information 
148