Table 81 attack logs – ZyXEL Communications NBG334SH User Manual

Page 181

Advertising
background image

Chapter 18 Logs

ZyXEL NBG-334SH User’s Guide

181

%s: Proxy mode
detected

The router detected proxy mode in the packet.

%s

The content filter server responded that the web site is in the blocked

category list, but it did not return the category type.

%s:%s

The content filter server responded that the web site is in the blocked

category list, and returned the category type.

%s(cache hit)

The system detected that the web site is in the blocked list from the

local cache, but does not know the category type.

%s:%s(cache hit)

The system detected that the web site is in blocked list from the local

cache, and knows the category type.

%s: Trusted Web site

The web site is in a trusted domain.

%s

When the content filter is not on according to the time schedule or you

didn't select the "Block Matched Web Site” check box, the system

forwards the web content.

Waiting content filter
server timeout

The external content filtering server did not respond within the timeout

period.

DNS resolving failed

The ZyXEL Device cannot get the IP address of the external content

filtering via DNS query.

Creating socket failed The ZyXEL Device cannot issue a query because TCP/IP socket

creation failed, port:port number.

Connecting to content
filter server fail

The connection to the external content filtering server failed.

License key is invalid The external content filtering license key is invalid.

Table 81 Attack Logs

LOG MESSAGE

DESCRIPTION

attack [TCP | UDP | IGMP
| ESP | GRE | OSPF]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.

attack ICMP (type:%d,
code:%d)

The firewall detected an ICMP attack. For type and code details,

see

Table 85 on page 184

.

land [TCP | UDP | IGMP |
ESP | GRE | OSPF]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land

attack.

land ICMP (type:%d,
code:%d)

The firewall detected an ICMP land attack. For type and code

details, see

Table 85 on page 184

.

ip spoofing - WAN [TCP |
UDP | IGMP | ESP | GRE |
OSPF]

The firewall detected an IP spoofing attack on the WAN port.

ip spoofing - WAN ICMP
(type:%d, code:%d)

The firewall detected an ICMP IP spoofing attack on the WAN

port. For type and code details, see

Table 85 on page 184

.

icmp echo: ICMP (type:%d,
code:%d)

The firewall detected an ICMP echo attack. For type and code

details, see

Table 85 on page 184

.

syn flood TCP

The firewall detected a TCP syn flood attack.

ports scan TCP

The firewall detected a TCP port scan attack.

teardrop TCP

The firewall detected a TCP teardrop attack.

Table 80 Content Filtering Logs (continued)

LOG MESSAGE

DESCRIPTION

Advertising