Table 82 pki logs – ZyXEL Communications NBG334SH User Manual

Page 182

Advertising
background image

Chapter 18 Logs

ZyXEL NBG-334SH User’s Guide

182


teardrop UDP

The firewall detected an UDP teardrop attack.

teardrop ICMP (type:%d,
code:%d)

The firewall detected an ICMP teardrop attack. For type and code

details, see

Table 85 on page 184

.

illegal command TCP

The firewall detected a TCP illegal command attack.

NetBIOS TCP

The firewall detected a TCP NetBIOS attack.

ip spoofing - no routing
entry [TCP | UDP | IGMP |
ESP | GRE | OSPF]

The firewall classified a packet with no source routing entry as an

IP spoofing attack.

ip spoofing - no routing
entry ICMP (type:%d,
code:%d)

The firewall classified an ICMP packet with no source routing

entry as an IP spoofing attack.

vulnerability ICMP
(type:%d, code:%d)

The firewall detected an ICMP vulnerability attack. For type and

code details, see

Table 85 on page 184

.

traceroute ICMP (type:%d,
code:%d)

The firewall detected an ICMP traceroute attack. For type and

code details, see

Table 85 on page 184

.

Table 82 PKI Logs

LOG MESSAGE

DESCRIPTION

Enrollment successful

The SCEP online certificate enrollment was successful. The

Destination field records the certification authority server IP address

and port.

Enrollment failed

The SCEP online certificate enrollment failed. The Destination field

records the certification authority server’s IP address and port.

Failed to resolve
<SCEP CA server url>

The SCEP online certificate enrollment failed because the certification

authority server’s address cannot be resolved.

Enrollment successful

The CMP online certificate enrollment was successful. The Destination

field records the certification authority server’s IP address and port.

Enrollment failed

The CMP online certificate enrollment failed. The Destination field

records the certification authority server’s IP address and port.

Failed to resolve <CMP
CA server url>

The CMP online certificate enrollment failed because the certification

authority server’s IP address cannot be resolved.

Rcvd ca cert: <subject
name>

The router received a certification authority certificate, with subject

name as recorded, from the LDAP server whose IP address and port

are recorded in the Source field.

Rcvd user cert:
<subject name>

The router received a user certificate, with subject name as recorded,

from the LDAP server whose IP address and port are recorded in the

Source field.

Rcvd CRL <size>:
<issuer name>

The router received a CRL (Certificate Revocation List), with size and

issuer name as recorded, from the LDAP server whose IP address and

port are recorded in the Source field.

Rcvd ARL <size>:
<issuer name>

The router received an ARL (Authority Revocation List), with size and

issuer name as recorded, from the LDAP server whose address and

port are recorded in the Source field.

Table 81 Attack Logs (continued)

LOG MESSAGE

DESCRIPTION

Advertising