Table 257 Attack Logs - ZyXEL Communications ZyWall 70 User Manual

Internet security appliance
Hide thumbs Also See for ZyWall 70:
Table of Contents

Advertisement

ZyWALL 70 User's Guide
Table 256 Content Filtering Logs (continued)
LOG MESSAGE
%s: Forbidden Web site The web site is in the forbidden web site list.
%s: Contains ActiveX
%s: Contains Java
applet
%s: Contains cookie
%s: Proxy mode
detected
%s
%s: %s
%s(cache hit)
%s :%s(cache hit)
%s: Trusted Web site
%s
Waiting content filter
server timeout
DNS resolving failed
Creating socket failed The ZyWALL cannot issue a query because TCP/IP socket creation
Connecting to content
filter server fail
License key is invalid The external content filtering license key is invalid.
For type and code details, see

Table 257 Attack Logs

LOG MESSAGE
attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
attack ICMP (type:%d,
code:%d)
land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
land ICMP (type:%d,
code:%d)
ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]
682
DESCRIPTION
The web site contains ActiveX.
The web site contains a Java applet.
The web site contains a cookie.
The router detected proxy mode in the packet.
The content filter server responded that the web site is in the blocked
category list, but it did not return the category type.
The content filter server responded that the web site is in the blocked
category list, and returned the category type.
The system detected that the web site is in the blocked list from the
local cache, but does not know the category type.
The system detected that the web site is in blocked list from the local
cache, and knows the category type.
The web site is in a trusted domain.
When the content filter is not on according to the time schedule or you
didn't select the "Block Matched Web Site" checkbox, the system
forwards the web content.
The external content filtering server did not respond within the timeout
period.
The ZyWALL cannot get the IP address of the external content filtering
via DNS query.
failed, port:port number.
The connection to the external content filtering server failed.
Table 266 on page
691.
DESCRIPTION
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
The firewall detected an ICMP attack.
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land
attack.
The firewall detected an ICMP land attack.
The firewall detected an IP spoofing attack on the WAN port.
Appendix R Log Descriptions

Advertisement

Table of Contents
loading

Table of Contents