Table 149 802.1X Logs - ZyXEL Communications P-2602H User Manual

P-2602h series adsl2+ voip iad
Hide thumbs Also See for P-2602H:
Table of Contents

Advertisement

Chapter 26 Logs
Table 148 Attack Logs (continued)
LOG MESSAGE
ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]
ip spoofing - WAN ICMP
(type:%d, code:%d)
icmp echo : ICMP
(type:%d, code:%d)
syn flood TCP
ports scan TCP
teardrop TCP
teardrop UDP
teardrop ICMP (type:%d,
code:%d)
illegal command TCP
NetBIOS TCP
ip spoofing - no routing
entry [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
ip spoofing - no routing
entry ICMP (type:%d,
code:%d)
vulnerability ICMP
(type:%d, code:%d)
traceroute ICMP (type:%d,
code:%d)

Table 149 802.1X Logs

LOG MESSAGE
Local User Database accepts
user.
Local User Database reports user
credential error.
Local User Database does not
find user`s credential.
RADIUS accepts user.
RADIUS rejects user. Pls check
RADIUS Server.
Local User Database does not
support authentication method.
User logout because of session
timeout expired.
User logout because of user
deassociation.
340
DESCRIPTION
The firewall detected an IP spoofing attack on the WAN port.
The firewall detected an ICMP IP spoofing attack on the WAN
port.
The firewall detected an ICMP echo attack.
The firewall detected a TCP syn flood attack.
The firewall detected a TCP port scan attack.
The firewall detected a TCP teardrop attack.
The firewall detected an UDP teardrop attack.
The firewall detected an ICMP teardrop attack.
The firewall detected a TCP illegal command attack.
The firewall detected a TCP NetBIOS attack.
The firewall classified a packet with no source routing entry as an
IP spoofing attack.
The firewall classified an ICMP packet with no source routing
entry as an IP spoofing attack.
The firewall detected an ICMP vulnerability attack.
The firewall detected an ICMP traceroute attack.
DESCRIPTION
A user was authenticated by the local user database.
A user was not authenticated by the local user database
because of an incorrect user password.
A user was not authenticated by the local user database
because the user is not listed in the local user database.
A user was authenticated by the RADIUS Server.
A user was not authenticated by the RADIUS Server.
Please check the RADIUS Server.
The local user database only supports the EAP-MD5
method. A user tried to use another authentication
method and was not authenticated.
The router logged out a user whose session expired.
The router logged out a user who ended the session.
P-2602H(W)(L)-DxA User's Guide

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents