ZyXEL Communications Prestige 2602R Series User Manual

Page 431

Advertising
background image

Prestige 2602R Series User’s Guide

Appendix K Log Descriptions

431

For type and code details, see

Table 161 on page 432

.

Table 157 UPnP Logs

LOG MESSAGE

DESCRIPTION

UPnP pass through Firewall

UPnP packets can pass through the firewall.

Table 158 Content Filtering Logs

LOG MESSAGE

DESCRIPTION

%s: block keyword

The content of a requested web page matched a user defined keyword.

%s

The system forwarded web content.

Table 159 Attack Logs

LOG MESSAGE

DESCRIPTION

attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.

attack ICMP (type:%d,
code:%d)

The firewall detected an ICMP attack.

land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land

attack.

land ICMP (type:%d,
code:%d)

The firewall detected an ICMP land attack.

ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]

The firewall detected an IP spoofing attack on the WAN port.

ip spoofing - WAN ICMP
(type:%d, code:%d)

The firewall detected an ICMP IP spoofing attack on the WAN port.

icmp echo : ICMP
(type:%d, code:%d)

The firewall detected an ICMP echo attack.

syn flood TCP

The firewall detected a TCP syn flood attack.

ports scan TCP

The firewall detected a TCP port scan attack.

teardrop TCP

The firewall detected a TCP teardrop attack.

teardrop UDP

The firewall detected an UDP teardrop attack.

teardrop ICMP (type:%d,
code:%d)

The firewall detected an ICMP teardrop attack.

illegal command TCP

The firewall detected a TCP illegal command attack.

NetBIOS TCP

The firewall detected a TCP NetBIOS attack.

ip spoofing - no routing
entry [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]

The firewall classified a packet with no source routing entry as an

IP spoofing attack.

Advertising