Table 152 Attack Logs - ZyXEL Communications P-660H-D Series User Manual

Adsl 2+ gateway
Hide thumbs Also See for P-660H-D Series:
Table of Contents

Advertisement

P-660R/H-D Series User's Guide
Table 151 Content Filtering Logs (continued)
LOG MESSAGE
Connecting to content
filter server fail
License key is invalid The external content filtering license key is invalid.

Table 152 Attack Logs

LOG MESSAGE
attack [TCP | UDP | IGMP |
ESP | GRE | OSPF]
attack ICMP (type:%d,
code:%d)
land [TCP | UDP | IGMP |
ESP | GRE | OSPF]
land ICMP (type:%d,
code:%d)
ip spoofing - WAN [TCP |
UDP | IGMP | ESP | GRE |
OSPF]
ip spoofing - WAN ICMP
(type:%d, code:%d)
icmp echo: ICMP (type:%d,
code:%d)
syn flood TCP
ports scan TCP
teardrop TCP
teardrop UDP
teardrop ICMP (type:%d,
code:%d)
illegal command TCP
NetBIOS TCP
ip spoofing - no routing
entry [TCP | UDP | IGMP |
ESP | GRE | OSPF]
ip spoofing - no routing
entry ICMP (type:%d,
code:%d)
vulnerability ICMP
(type:%d, code:%d)
traceroute ICMP (type:%d,
code:%d)
401
DESCRIPTION
The connection to the external content filtering server failed.
DESCRIPTION
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
The firewall detected an ICMP attack. For type and code details,
see
Table 159 on page
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land
attack.
The firewall detected an ICMP land attack. For type and code
details, see
Table 159 on page
The firewall detected an IP spoofing attack on the WAN port.
The firewall detected an ICMP IP spoofing attack on the WAN port.
For type and code details, see
The firewall detected an ICMP echo attack. For type and code
details, see
Table 159 on page
The firewall detected a TCP syn flood attack.
The firewall detected a TCP port scan attack.
The firewall detected a TCP teardrop attack.
The firewall detected an UDP teardrop attack.
The firewall detected an ICMP teardrop attack. For type and code
details, see
Table 159 on page
The firewall detected a TCP illegal command attack.
The firewall detected a TCP NetBIOS attack.
The firewall classified a packet with no source routing entry as an
IP spoofing attack.
The firewall classified an ICMP packet with no source routing entry
as an IP spoofing attack.
The firewall detected an ICMP vulnerability attack. For type and
code details, see
Table 159 on page
The firewall detected an ICMP traceroute attack. For type and
code details, see
Table 159 on page
408.
408.
Table 159 on page
408.
408.
408.
408.
Appendix M Log Descriptions
408.

Advertisement

Table of Contents
loading

Table of Contents