Table 81 Attack Logs - ZyXEL Communications ZyXEL NBG334SH User Manual

802.11g super g high power wireless router
Hide thumbs Also See for ZyXEL NBG334SH:
Table of Contents

Advertisement

Table 80 Content Filtering Logs (continued)
LOG MESSAGE
%s: Proxy mode
detected
%s
%s:%s
%s(cache hit)
%s:%s(cache hit)
%s: Trusted Web site
%s
Waiting content filter
server timeout
DNS resolving failed
Creating socket failed The ZyXEL Device cannot issue a query because TCP/IP socket
Connecting to content
filter server fail
License key is invalid The external content filtering license key is invalid.

Table 81 Attack Logs

LOG MESSAGE
attack [TCP | UDP | IGMP
| ESP | GRE | OSPF]
attack ICMP (type:%d,
code:%d)
land [TCP | UDP | IGMP |
ESP | GRE | OSPF]
land ICMP (type:%d,
code:%d)
ip spoofing - WAN [TCP |
UDP | IGMP | ESP | GRE |
OSPF]
ip spoofing - WAN ICMP
(type:%d, code:%d)
icmp echo: ICMP (type:%d,
code:%d)
syn flood TCP
ports scan TCP
teardrop TCP
ZyXEL NBG-334SH User's Guide
DESCRIPTION
The router detected proxy mode in the packet.
The content filter server responded that the web site is in the blocked
category list, but it did not return the category type.
The content filter server responded that the web site is in the blocked
category list, and returned the category type.
The system detected that the web site is in the blocked list from the
local cache, but does not know the category type.
The system detected that the web site is in blocked list from the local
cache, and knows the category type.
The web site is in a trusted domain.
When the content filter is not on according to the time schedule or you
didn't select the "Block Matched Web Site" check box, the system
forwards the web content.
The external content filtering server did not respond within the timeout
period.
The ZyXEL Device cannot get the IP address of the external content
filtering via DNS query.
creation failed, port:port number.
The connection to the external content filtering server failed.
DESCRIPTION
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
The firewall detected an ICMP attack. For type and code details,
see
Table 85 on page
184.
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land
attack.
The firewall detected an ICMP land attack. For type and code
details, see
Table 85 on page
The firewall detected an IP spoofing attack on the WAN port.
The firewall detected an ICMP IP spoofing attack on the WAN
port. For type and code details, see
The firewall detected an ICMP echo attack. For type and code
details, see
Table 85 on page
The firewall detected a TCP syn flood attack.
The firewall detected a TCP port scan attack.
The firewall detected a TCP teardrop attack.
Chapter 18 Logs
184.
Table 85 on page
184.
184.
181

Advertisement

Table of Contents
loading

Table of Contents