Table 126 Upnp Logs; Table 127 Content Filtering Logs; Table 128 Attack Logs - ZyXEL Communications P-2602R-DxA Series User Manual

Adsl2+ voip iad
Hide thumbs Also See for P-2602R-DxA Series:
Table of Contents

Advertisement

Table 126 UPnP Logs

LOG MESSAGE
UPnP pass through Firewall

Table 127 Content Filtering Logs

LOG MESSAGE
%s: block keyword
%s
For type and code details, see

Table 128 Attack Logs

LOG MESSAGE
attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
attack ICMP (type:%d,
code:%d)
land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
land ICMP (type:%d,
code:%d)
ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]
ip spoofing - WAN ICMP
(type:%d, code:%d)
icmp echo : ICMP
(type:%d, code:%d)
syn flood TCP
ports scan TCP
teardrop TCP
teardrop UDP
teardrop ICMP (type:%d,
code:%d)
illegal command TCP
NetBIOS TCP
ip spoofing - no routing
entry [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
Appendix H Log Descriptions
DESCRIPTION
UPnP packets can pass through the firewall.
DESCRIPTION
The content of a requested web page matched a user defined keyword.
The system forwarded web content.
Table 131 on page
309.
DESCRIPTION
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
The firewall detected an ICMP attack.
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land
attack.
The firewall detected an ICMP land attack.
The firewall detected an IP spoofing attack on the WAN port.
The firewall detected an ICMP IP spoofing attack on the WAN port.
The firewall detected an ICMP echo attack.
The firewall detected a TCP syn flood attack.
The firewall detected a TCP port scan attack.
The firewall detected a TCP teardrop attack.
The firewall detected an UDP teardrop attack.
The firewall detected an ICMP teardrop attack.
The firewall detected a TCP illegal command attack.
The firewall detected a TCP NetBIOS attack.
The firewall classified a packet with no source routing entry as an
IP spoofing attack.
P-2602R/RL-DxA Series User's Guide
307

Advertisement

Table of Contents
loading

Table of Contents