ZyWALL Series Internet Security Gateway
LOG MESSAGE
attack [ TCP | UDP | IGMP | ESP |
GRE | OSPF ]
attack ICMP (type:%d, code:%d)
land [ TCP | UDP | IGMP | ESP |
GRE | OSPF ]
land ICMP (type:%d, code:%d)
ip spoofing - WAN [ TCP | UDP |
IGMP | ESP | GRE | OSPF ]
ip spoofing - WAN ICMP (type:%d,
code:%d)
icmp echo : ICMP (type:%d,
code:%d)
syn flood TCP
ports scan TCP
teardrop TCP
teardrop UDP
teardrop ICMP (type:%d, code:%d)
illegal command TCP
NetBIOS TCP
ip spoofing - no routing entry [ TCP |
UDP | IGMP | ESP | GRE | OSPF ]
ip spoofing - no routing entry ICMP
(type:%d, code:%d)
S-8
Chart S-11 Attack Logs
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
The firewall detected an ICMP attack, see the section on
ICMP messages for type and code details.
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF
land attack.
The firewall detected an ICMP land attack, see the section on
ICMP messages for type and code details.
The firewall detected an IP spoofing attack on the WAN
port.
The firewall detected an ICMP IP spoofing attack on the WAN
port. See the section on ICMP messages for type and code
details.
The firewall detected an ICMP echo attack. See the section on
ICMP messages for type and code details.
The firewall detected a TCP syn flood attack.
The firewall detected a TCP port scan attack.
The firewall detected a TCP teardrop attack.
The firewall detected an UDP teardrop attack.
The firewall detected an ICMP teardrop attack, see the section on
ICMP messages for type and code details.
The firewall detected a TCP illegal command attack.
The firewall detected a TCP NetBIOS attack.
The firewall classified a packet with no source routing entry
as an IP spoofing attack.
The firewall classified an ICMP packet with no source
routing entry as an IP spoofing attack.
DESCRIPTION
Log Descriptions