Chart K-4 Attack Logs - ZyXEL Communications Prestige 652H series User Manual

Adsl security/wireless lan router
Hide thumbs Also See for Prestige 652H series:
Table of Contents

Advertisement

LOG MESSAGE
attack (Protocol)
land Protocol)
icmp echo ICMP
(type:%d, code:%d)
syn flood TCP
ports scan TCP
teardrop (Protocol)
illegal command TCP
NetBIOS TCP
ip spoofing - no
routing entry
(Protocol)
vulnerability ICMP
(type:%d, code:%d)
traceroute ICMP
(type:%d, code:%d)
Access logs may include the following information:
(Protocol) is the protocol of the packet (for example TCP or UDP) that triggered the log.
(Direction) is the direction in which the packet was traveling (for example LAN to WAN or WAN
to LAN)
(Rule) is the number of the firewall rule that caused the log.
Log Descriptions

Chart K-4 Attack Logs

The firewall detected an attack. The log may also display the protocol
(for example TCP or UDP).
The firewall detected a land attack. The log may also display the
protocol (for example TCP or UDP).
The firewall detected an ICMP echo attack. See the section on ICMP
messages for type and code details.
The firewall detected a TCP syn flood attack.
The firewall detected a TCP port scan attack.
The firewall detected a teardrop attack.
The firewall detected a TCP SMTP illegal command attack.
The firewall detected a TCP NetBIOS attack.
The firewall detected an IP spoofing attack while the Prestige did not
have a default route. The log may also display the protocol (for
example TCP or UDP).
The firewall detected an ICMP vulnerability attack; see the section on
ICMP messages for type and code details.
The firewall detected an ICMP traceroute attack; see the section on
ICMP messages for type and code details.
Prestige 652H/HW Series User's Guide
DESCRIPTION
K-3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Prestige 652hw series

Table of Contents