ZyXEL Communications P-660HNT1 User Manual page 217

802.11n wireless adsl2+ 4-port gateway
Hide thumbs Also See for P-660HNT1:
Table of Contents

Advertisement

Table 81 PPP Logs (continued)
LOG MESSAGE
ppp:LCP Closing
ppp:IPCP Closing
Table 82 UPnP Logs
LOG MESSAGE
UPnP pass through Firewall
Table 83 Content Filtering Logs
LOG MESSAGE
%s: block keyword
%s
For type and code details, see
Table 84 Attack Logs
LOG MESSAGE
attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
attack ICMP (type:%d,
code:%d)
land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
land ICMP (type:%d,
code:%d)
ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]
ip spoofing - WAN ICMP
(type:%d, code:%d)
icmp echo : ICMP
(type:%d, code:%d)
syn flood TCP
ports scan TCP
teardrop TCP
teardrop UDP
teardrop ICMP (type:%d,
code:%d)
illegal command TCP
P-660HN-TxA User's Guide
DESCRIPTION
The PPP connection's Link Control Protocol stage is closing.
The PPP connection's Internet Protocol Control Protocol stage is
closing.
DESCRIPTION
UPnP packets can pass through the firewall.
DESCRIPTION
The content of a requested web page matched a user defined
keyword.
The system forwarded web content.
Table 87 on page
219.
DESCRIPTION
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF
attack.
The firewall detected an ICMP attack.
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF
land attack.
The firewall detected an ICMP land attack.
The firewall detected an IP spoofing attack on the WAN
port.
The firewall detected an ICMP IP spoofing attack on the
WAN port.
The firewall detected an ICMP echo attack.
The firewall detected a TCP syn flood attack.
The firewall detected a TCP port scan attack.
The firewall detected a TCP teardrop attack.
The firewall detected an UDP teardrop attack.
The firewall detected an ICMP teardrop attack.
The firewall detected a TCP illegal command attack.
Chapter 20 Logs
217

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-660hn-txa

Table of Contents