Table 190 attack logs – ZyXEL Communications 802.11g ADSL 2+ 4-Port Security Gateway HW-D Series User Manual

Page 470

Advertising
background image

P-662H/HW-D Series User’s Guide

470

Appendix O Log Descriptions

Connecting to content
filter server fail

The connection to the external content filtering server failed.

License key is invalid The external content filtering license key is invalid.

Table 190 Attack Logs

LOG MESSAGE

DESCRIPTION

attack [TCP | UDP | IGMP |
ESP | GRE | OSPF]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.

attack ICMP (type:%d,
code:%d)

The firewall detected an ICMP attack. For type and code details,

see

Table 197 on page 477

.

land [TCP | UDP | IGMP |
ESP | GRE | OSPF]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land

attack.

land ICMP (type:%d,
code:%d)

The firewall detected an ICMP land attack. For type and code

details, see

Table 197 on page 477

.

ip spoofing - WAN [TCP |
UDP | IGMP | ESP | GRE |
OSPF]

The firewall detected an IP spoofing attack on the WAN port.

ip spoofing - WAN ICMP
(type:%d, code:%d)

The firewall detected an ICMP IP spoofing attack on the WAN port.

For type and code details, see

Table 197 on page 477

.

icmp echo: ICMP (type:%d,
code:%d)

The firewall detected an ICMP echo attack. For type and code

details, see

Table 197 on page 477

.

syn flood TCP

The firewall detected a TCP syn flood attack.

ports scan TCP

The firewall detected a TCP port scan attack.

teardrop TCP

The firewall detected a TCP teardrop attack.

teardrop UDP

The firewall detected an UDP teardrop attack.

teardrop ICMP (type:%d,
code:%d)

The firewall detected an ICMP teardrop attack. For type and code

details, see

Table 197 on page 477

.

illegal command TCP

The firewall detected a TCP illegal command attack.

NetBIOS TCP

The firewall detected a TCP NetBIOS attack.

ip spoofing - no routing
entry [TCP | UDP | IGMP |
ESP | GRE | OSPF]

The firewall classified a packet with no source routing entry as an

IP spoofing attack.

ip spoofing - no routing
entry ICMP (type:%d,
code:%d)

The firewall classified an ICMP packet with no source routing entry

as an IP spoofing attack.

vulnerability ICMP
(type:%d, code:%d)

The firewall detected an ICMP vulnerability attack. For type and

code details, see

Table 197 on page 477

.

traceroute ICMP (type:%d,
code:%d)

The firewall detected an ICMP traceroute attack. For type and

code details, see

Table 197 on page 477

.

Table 189 Content Filtering Logs (continued)

LOG MESSAGE

DESCRIPTION

Advertising
This manual is related to the following products: