172 Chapter 14 System information and diagnosisNN47923-501Packet triggeredFilter logPacket triggered Message FormatSdcmdSyslogSend( SYSLOG_PKTTRI, SYSLOG_NOTICE, String );String = Packet trigger: Protocol=xx Data=xxxxxxxxxx…..xProtocol: (1:IP 2:IPX 3:IPXHC 4:BPDU 5:ATALK 6:IPNG)Data: We will send forty-eight Hex characters to the serverJul 19 11:28:39 192.168.102.2 RAS: Packet Trigger: Protocol=1,Data=4500003c100100001f010004c0a86614ca849a7b08004a5c020001006162636465666768696a6b6c6d6e6f7071727374Jul 19 11:28:56 192.168.102.2 RAS: Packet Trigger: Protocol=1,Data=4500002c1b0140001f06b50ec0a86614ca849a7b0427001700195b3e00000000600220008cd40000020405b4Jul 19 11:29:06 192.168.102.2 RAS: Packet Trigger: Protocol=1,Data=45000028240140001f06ac12c0a86614ca849a7b0427001700195b451d1430135004000077600000Filter log Message FormatSdcmdSyslogSend(SYSLOG_FILLOG, SYSLOG_NOTICE, String );String = IP[Src=xx.xx.xx.xx Dst=xx.xx.xx.xx prot spo=xxxx dpo=xxxx]S04>R01mDIP[…] is the packet header and S04>R01mD means filter set 4 (S) and rule1 (R), match (m) drop (D).Src: Source AddressDst: Destination Addressprot: Protocol (“TCP”,”UDP”,”ICMP”)