Chart H-2 Upnp Logs; Chart H-3 Attack Logs - ZyXEL Communications 650 Series User Manual

Zyxel communications network device user's guide prestige 650 series
Table of Contents

Advertisement

Prestige 650 Series User's Guide
LOG MESSAGE
UPnP pass through
Firewall
The attack logs may include the protocol (Protocol) of the packet (for example TCP or UDP) that triggered
the log.
LOG MESSAGE
attack (Protocol)
land Protocol)
icmp echo ICMP
(type:%d, code:%d)
syn flood TCP
ports scan TCP
teardrop (Protocol)
illegal command TCP
NetBIOS TCP
ip spoofing - no
routing entry
(Protocol)
vulnerability ICMP
(type:%d, code:%d)
traceroute ICMP
(type:%d, code:%d)
Access logs may include the following information:
H-2

Chart H-2 UPnP Logs

UPnP packets can pass through the firewall.

Chart H-3 Attack Logs

The firewall detected an attack. The log may also display the protocol
(for example TCP or UDP).
The firewall detected a land attack. The log may also display the
protocol (for example TCP or UDP).
The firewall detected an ICMP echo attack. See the section on ICMP
messages for type and code details.
The firewall detected a TCP syn flood attack.
The firewall detected a TCP port scan attack.
The firewall detected a teardrop attack.
The firewall detected a TCP SMTP illegal command attack.
The firewall detected a TCP NetBIOS attack.
The firewall detected an IP spoofing attack while the Prestige did not
have a default route. The log may also display the protocol (for
example TCP or UDP).
The firewall detected an ICMP vulnerability attack; see the section on
ICMP messages for type and code details.
The firewall detected an ICMP traceroute attack; see the section on
ICMP messages for type and code details.
DESCRIPTION
DESCRIPTION
Log Descriptions

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prestige 650 series

Table of Contents