Table 177 Attack Logs - ZyXEL Communications VANTAGE REPORT - V3.0 User Manual

Table of Contents

Advertisement

Table 176 Content Filtering Logs (continued)
LOG MESSAGE
%s
Waiting content filter
server timeout
DNS resolving failed
Creating socket failed The Vantage Report cannot issue a query because TCP/IP socket
Connecting to content
filter server fail
License key is invalid The external content filtering license key is invalid.
For type and code details, see

Table 177 Attack Logs

LOG MESSAGE
attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
attack ICMP (type:%d,
code:%d)
land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
land ICMP (type:%d,
code:%d)
ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]
ip spoofing - WAN ICMP
(type:%d, code:%d)
icmp echo : ICMP
(type:%d, code:%d)
syn flood TCP
ports scan TCP
teardrop TCP
teardrop UDP
teardrop ICMP (type:%d,
code:%d)
illegal command TCP
NetBIOS TCP
ip spoofing - no routing
entry [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
Vantage Report User's Guide
DESCRIPTION
When the content filter is not on according to the time schedule or you
didn't select the "Block Matched Web Site" check box, the system
forwards the web content.
The external content filtering server did not respond within the timeout
period.
The Vantage Report cannot get the IP address of the external content
filtering via DNS query.
creation failed, port:port number.
The connection to the external content filtering server failed.
Table 185 on page
366.
DESCRIPTION
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
The firewall detected an ICMP attack.
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land
attack.
The firewall detected an ICMP land attack.
The firewall detected an IP spoofing attack on the WAN port.
The firewall detected an ICMP IP spoofing attack on the WAN port.
The firewall detected an ICMP echo attack.
The firewall detected a TCP syn flood attack.
The firewall detected a TCP port scan attack.
The firewall detected a TCP teardrop attack.
The firewall detected an UDP teardrop attack.
The firewall detected an ICMP teardrop attack.
The firewall detected a TCP illegal command attack.
The firewall detected a TCP NetBIOS attack.
The firewall classified a packet with no source routing entry as an
IP spoofing attack.
Appendix C ZyNOS Log Descriptions
357

Advertisement

Table of Contents
loading

This manual is also suitable for:

Vantage report

Table of Contents