Table 46 Wireless Logs; Table 47 Ipsec Logs - ZyXEL Communications ZyWall 35 User Manual

Internet security appliance
Hide thumbs Also See for ZyWall 35:
Table of Contents

Advertisement

ZyWALL 35 User's Guide
Table 45 Remote Management Logs
LOG MESSAGE
Remote Management: WWW denied
Remote Management: HTTPS denied
Remote Management: SSH denied
Remote Management: ICMP Ping
response denied
Remote Management: SNMP denied
Remote Management: DNS denied

Table 46 Wireless Logs

LOG MESSAGE
WLAN MAC Filter Fail
WLAN MAC Filter Success
WLAN STA Association
WLAN STA Association List Full
WLAN STA Association Again

Table 47 IPSec Logs

LOG MESSAGE
Discard REPLAY packet
Inbound packet
authentication failed
Receive IPSec packet,
but no corresponding
tunnel exists
Rule <%d> idle time out,
disconnect
WAN IP changed to <IP>
Inbound packet decryption failed Please check the algorithm configuration.
680
DESCRIPTION
Attempted use of WWW service was blocked according to
remote management settings.
Attempted use of HTTPS service was blocked according to
remote management settings.
Attempted use of SSH service was blocked according to
remote management settings.
Attempted use of ICMP service was blocked according to
remote management settings.
Attempted use of SNMP service was blocked according to
remote management settings.
Attempted use of DNS service was blocked according to
remote management settings.
DESCRIPTION
The MAC filter blocked a wireless station from connecting to the
device.
The MAC filter allowed a wireless station to connect to the device.
A wireless station associated with the device.
The maximum number of associated wireless clients has been
reached.
The SSID and time of association were updated for an wireless
station that was already associated.
DESCRIPTION
The router received and discarded a packet with an incorrect
sequence number.
The router received a packet that has been altered. A third party may
have altered or tampered with the packet.
The router dropped an inbound packet for which SPI could not find a
corresponding phase 2 SA.
The router dropped a connection that had outbound traffic and no
inbound traffic for a certain time period. You can use the "ipsec timer
chk_conn" CI command to set the time period. The default value is 2
minutes.
The router dropped all connections with the "MyIP" configured as
"0.0.0.0" when the WAN IP address changed.
Appendix Q Log Descriptions

Advertisement

Table of Contents
loading

Table of Contents