ZyXEL Communications 802.11g HomePlug AV ADSL2+ Gateway P-660HWP-Dx User Manual

Page 276

Advertising
background image

Chapter 20 Logs

P-660HWP-Dx User’s Guide

40

Starting Connectivity
Monitor

Starting Connectivity Monitor.

Time initialized by Daytime
Server

The router got the time and date from the Daytime server.

Time initialized by Time
server

The router got the time and date from the time server.

Time initialized by NTP
server

The router got the time and date from the NTP server.

Connect to Daytime server
fail

The router was not able to connect to the Daytime server.

Connect to Time server fail

The router was not able to connect to the Time server.

Connect to NTP server fail

The router was not able to connect to the NTP server.

Too large ICMP packet has
been dropped

The router dropped an ICMP packet that was too large.

Configuration Change: PC =
0x%x, Task ID = 0x%x

The router is saving configuration changes.

Successful SSH login

Someone has logged on to the router’s SSH server.

SSH login failed

Someone has failed to log on to the router’s SSH server.

Successful HTTPS login

Someone has logged on to the router's web configurator

interface using HTTPS protocol.

HTTPS login failed

Someone has failed to log on to the router's web configurator

interface using HTTPS protocol.

Table 112 System Error Logs

LOG MESSAGE

DESCRIPTION

%s exceeds the max.
number of session per
host!

This attempt to create a NAT session exceeds the maximum

number of NAT session table entries allowed to be created per

host.

setNetBIOSFilter: calloc
error

The router failed to allocate memory for the NetBIOS filter

settings.

readNetBIOSFilter: calloc
error

The router failed to allocate memory for the NetBIOS filter

settings.

WAN connection is down.

A WAN connection is down. You cannot access the network

through this interface.

Table 113 Access Control Logs

LOG MESSAGE

DESCRIPTION

Firewall default policy: [TCP |
UDP | IGMP | ESP | GRE | OSPF]
<Packet Direction>

Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access

matched the default policy and was blocked or forwarded

according to the default policy’s setting.

Firewall rule [NOT] match:[TCP |
UDP | IGMP | ESP | GRE | OSPF]
<Packet Direction>, <rule:%d>

Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access

matched (or did not match) a configured firewall rule

(denoted by its number) and was blocked or forwarded

according to the rule.

Table 111 System Maintenance Logs (continued)

LOG MESSAGE

DESCRIPTION

Advertising