ZyXEL Communications P-2602HW(L) Series User Manual

Page 385

Advertising
background image

P-2602H(W)(L)-DxA Series User’s Guide

Appendix I Log Descriptions

385

For type and code details, see

Table 165 on page 387

.

Table 160 UPnP Logs

LOG MESSAGE

DESCRIPTION

UPnP pass through Firewall

UPnP packets can pass through the firewall.

Table 161 Content Filtering Logs

LOG MESSAGE

DESCRIPTION

%s: block keyword

The content of a requested web page matched a user defined keyword.

%s

The system forwarded web content.

Table 162 Attack Logs

LOG MESSAGE

DESCRIPTION

attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.

attack ICMP (type:%d,
code:%d)

The firewall detected an ICMP attack.

land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land

attack.

land ICMP (type:%d,
code:%d)

The firewall detected an ICMP land attack.

ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]

The firewall detected an IP spoofing attack on the WAN port.

ip spoofing - WAN ICMP
(type:%d, code:%d)

The firewall detected an ICMP IP spoofing attack on the WAN port.

icmp echo : ICMP
(type:%d, code:%d)

The firewall detected an ICMP echo attack.

syn flood TCP

The firewall detected a TCP syn flood attack.

ports scan TCP

The firewall detected a TCP port scan attack.

teardrop TCP

The firewall detected a TCP teardrop attack.

teardrop UDP

The firewall detected an UDP teardrop attack.

teardrop ICMP (type:%d,
code:%d)

The firewall detected an ICMP teardrop attack.

illegal command TCP

The firewall detected a TCP illegal command attack.

NetBIOS TCP

The firewall detected a TCP NetBIOS attack.

ip spoofing - no routing
entry [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]

The firewall classified a packet with no source routing entry as an

IP spoofing attack.

Advertising
This manual is related to the following products: