Table 116 Access Control Logs; Table 117 Tcp Reset Logs - ZyXEL Communications ZYWALL P1 User Manual

Internet security appliance
Hide thumbs Also See for ZYWALL P1:
Table of Contents

Advertisement

Table 115 System Error Logs (continued)
LOG MESSAGE
Dial Backup starts
Dial Backup ends
DHCP Server cannot assign
the static IP %S (out of
range).
The DHCP static IP %s is
conflict.
SMTP fail (%s)
SMTP authentication fail
(%s)

Table 116 Access Control Logs

LOG MESSAGE
Firewall default policy: [ TCP |
UDP | IGMP | ESP | GRE | OSPF ]
<Packet Direction>
Firewall rule [NOT] match:[ TCP
| UDP | IGMP | ESP | GRE | OSPF
] <Packet Direction>, <rule:%d>
Triangle route packet forwarded:
[ TCP | UDP | IGMP | ESP | GRE |
OSPF ]
Packet without a NAT table entry
blocked: [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
Router sent blocked web site
message: TCP
Exceed maximum sessions per host
(%d).
Firewall allowed a packet that
matched a NAT session: [ TCP |
UDP ]

Table 117 TCP Reset Logs

LOG MESSAGE
Under SYN flood attack,
sent TCP RST
Exceed TCP MAX
incomplete, sent TCP RST
Peer TCP state out of
order, sent TCP RST
ZyWALL P1 User's Guide
DESCRIPTION
Dial backup started working.
Dial backup stopped working.
The LAN subnet, LAN alias 1, or LAN alias 2 was changed and
the specified static DHCP IP addresses are no longer valid.
The static DHCP IP address conflicts with another host.
The device failed to send an e-mail (error message included).
The device failed to authenticate with the SMTP server (error
message included).
DESCRIPTION
Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access
matched the default policy and was blocked or forwarded
according to the default policy's setting.
Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access
matched (or did not match) a configured firewall rule
(denoted by its number) and was blocked or forwarded
according to the rule.
The firewall allowed a triangle route session to pass
through.
The router blocked a packet that didn't have a
corresponding NAT table entry.
The router sent a message to notify a user that the router
blocked access to a web site that the user requested.
The device blocked a session because the host's
connections exceeded the maximum sessions per host.
A packet from the WAN (TCP or UDP) matched a cone
NAT session and the device forwarded it to the LAN.
DESCRIPTION
The router sent a TCP reset packet when a host was under a SYN
flood attack (the TCP incomplete count is per destination host.)
The router sent a TCP reset packet when the number of TCP
incomplete connections exceeded the user configured threshold.
(the TCP incomplete count is per destination host.) Note: Refer to
TCP Maximum Incomplete in the Firewall Attack Alerts screen.
The router sent a TCP reset packet when a TCP connection state
was out of order.Note: The firewall refers to RFC793 Figure 6 to
check the TCP state.
Chapter 22 Logs
349

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents