Multi-Tech Systems RF660 User Manual

Page of 189
Appendix A – Disposition of Events  
Multi-Tech Systems, Inc. RouteFinderVPN RF760/660/600VPN User Guide (PN S000323D) 
143 
 
Admin Port Access Requests 
All requests to the Administrative port (HTTPS/HTTP to the box using the WEB GUI) are logged as Admin Port Traffic. 
Access requests logged as Admin Port Access requests correspond to LO1.F of Baseline module - version 4.0, ICSA Labs. 
Figure 11 shows a snapshot of Admin Port Access log. 
Startup History 
The system startup Timestamp is logged as Startup History. Startup History corresponds to LO1.G of Baseline module - 
version 4.0, ICSA Labs. 
Figure 12 shows a snapshot of Startup History. 
User Defined Log 
User defined logging is classified as User logs. Administrators can log packets using the Packet Filers > Add User Defined 
Packet Filter Rules
 and selecting LOG as the action.  
Note:
 User logging is allowed only on routed packets. 
Figure 13 shows a snapshot of user defined log. 
Fragmented Packets Log 
Fragments packets can be logged as Dropped Fragmented. Logging of Dropped Fragmented Packets can be configured 
through Packet Filters > Advanced > Drop Fragmented Packets. Logging is allowed only if fragments are dropped. 
Figure 14 shows a snapshot of Fragmented Packets log. 
ICMP information 
Information about ICMP requests is available in the remarks. Type and Code information is displayed after the event type. 
ICMP information meets requirement LO2.G of Baseline module - version 4.0, ICSA Labs. 
Figure 15 shows a snapshot with ICMP information. 
 
 
II. Inbound Access Log 
 
 Figure 1 
 Inbound Access 
 
 
Figure 2 
 Snapshot of Inbound Access Log 
Description of Figure 2 
The Access request originated from the source (204.26.122.9) to the destination (204.54.39.103) is accepted by the 
candidate firewall. Classified as Inbound Accepted