Table 156 System Error Logs; Table 157 Access Control Logs; Table 158 Tcp Reset Logs - ZyXEL Communications P-2602HWLNI User Manual

P-2602hwlni series 802.11g wireless adsl2+ 4-port voip iad
Table of Contents

Advertisement

Table 156 System Error Logs

LOG MESSAGE
%s exceeds the max.
number of session per
host!
setNetBIOSFilter: calloc
error
readNetBIOSFilter: calloc
error
WAN connection is down.

Table 157 Access Control Logs

LOG MESSAGE
Firewall default policy: [ TCP |
UDP | IGMP | ESP | GRE | OSPF ]
<Packet Direction>
Firewall rule [NOT] match:[ TCP
| UDP | IGMP | ESP | GRE | OSPF
] <Packet Direction>, <rule:%d>
Triangle route packet forwarded:
[ TCP | UDP | IGMP | ESP | GRE |
OSPF ]
Packet without a NAT table entry
blocked: [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
Router sent blocked web site
message: TCP

Table 158 TCP Reset Logs

LOG MESSAGE
Under SYN flood attack,
sent TCP RST
Exceed TCP MAX
incomplete, sent TCP RST
Peer TCP state out of
order, sent TCP RST
Firewall session time
out, sent TCP RST
P-2602HWLNI User's Guide
DESCRIPTION
This attempt to create a NAT session exceeds the maximum
number of NAT session table entries allowed to be created per
host.
The router failed to allocate memory for the NetBIOS filter
settings.
The router failed to allocate memory for the NetBIOS filter
settings.
A WAN connection is down. You cannot access the network
through this interface.
DESCRIPTION
Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access
matched the default policy and was blocked or forwarded
according to the default policy's setting.
Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access
matched (or did not match) a configured firewall rule
(denoted by its number) and was blocked or forwarded
according to the rule.
The firewall allowed a triangle route session to pass
through.
The router blocked a packet that didn't have a
corresponding NAT table entry.
The router sent a message to notify a user that the router
blocked access to a web site that the user requested.
DESCRIPTION
The router sent a TCP reset packet when a host was under a SYN
flood attack (the TCP incomplete count is per destination host.)
The router sent a TCP reset packet when the number of TCP
incomplete connections exceeded the user configured threshold.
(the TCP incomplete count is per destination host.) Note: Refer to
TCP Maximum Incomplete in the Firewall Attack Alerts screen.
The router sent a TCP reset packet when a TCP connection state
was out of order.Note: The firewall refers to RFC793 Figure 6 to
check the TCP state.
The router sent a TCP reset packet when a dynamic firewall
session timed out.Default timeout values:ICMP idle timeout (s):
60UDP idle timeout (s): 60TCP connection (three way
handshaking) timeout (s): 30TCP FIN-wait timeout (s): 60TCP idle
(established) timeout (s): 3600
Chapter 27 Logs
393

Advertisement

Table of Contents
loading

This manual is also suitable for:

P-2602hwlni-d3aP-2602hwlni-d7a

Table of Contents