ZyXEL Communications NBG334SH User Manual

Page 178

Advertising
background image

Chapter 18 Logs

ZyXEL NBG-334SH User’s Guide

178

Table 72 System Error Logs

LOG MESSAGE

DESCRIPTION

%s exceeds the max.
number of session per
host!

This attempt to create a NAT session exceeds the maximum

number of NAT session table entries allowed to be created per

host.

setNetBIOSFilter: calloc
error

The router failed to allocate memory for the NetBIOS filter

settings.

readNetBIOSFilter: calloc
error

The router failed to allocate memory for the NetBIOS filter

settings.

WAN connection is down.

A WAN connection is down. You cannot access the network

through this interface.

Table 73 Access Control Logs

LOG MESSAGE

DESCRIPTION

Firewall default policy: [TCP |
UDP | IGMP | ESP | GRE | OSPF]
<Packet Direction>

Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access

matched the default policy and was blocked or forwarded

according to the default policy’s setting.

Firewall rule [NOT] match:[TCP |
UDP | IGMP | ESP | GRE | OSPF]
<Packet Direction>, <rule:%d>

Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access

matched (or did not match) a configured firewall rule

(denoted by its number) and was blocked or forwarded

according to the rule.

Triangle route packet forwarded:
[TCP | UDP | IGMP | ESP | GRE |
OSPF]

The firewall allowed a triangle route session to pass

through.

Packet without a NAT table entry
blocked: [TCP | UDP | IGMP | ESP
| GRE | OSPF]

The router blocked a packet that didn't have a

corresponding NAT table entry.

Router sent blocked web site
message: TCP

The router sent a message to notify a user that the router

blocked access to a web site that the user requested.

Table 74 TCP Reset Logs

LOG MESSAGE

DESCRIPTION

Under SYN flood attack,
sent TCP RST

The router sent a TCP reset packet when a host was under a SYN

flood attack (the TCP incomplete count is per destination host.)

Exceed TCP MAX
incomplete, sent TCP RST

The router sent a TCP reset packet when the number of TCP

incomplete connections exceeded the user configured threshold.

(the TCP incomplete count is per destination host.) Note: Refer to

TCP Maximum Incomplete in the Firewall Attack Alerts screen.

Peer TCP state out of
order, sent TCP RST

The router sent a TCP reset packet when a TCP connection state

was out of order.Note: The firewall refers to RFC793 Figure 6 to

check the TCP state.

Advertising