The logs contained in this document are divided in four categories. The categories are
router, firewall, Intrusion Detection Systems (IDS) and miscellaneous. These logs are
meet to be used as reference to identify the type of software that generated a log model
and if necessary, how they can be interpreted.