First identify which filters are causing the mismatch alert. This problem could indicate
a policy mismatch between the peer and this TCP/IP stack. Another
possibility is attempted suspicious activity.
Enable logging for the associated filter rule and monitor the traffic using the UNIX
syslog. This warning situation is based on the Packets Denied by Mismatch attribute.
By default, this situation is evaluated every 15 minutes and is not run at
startup.
|