ZyXEL Communications ZyWALL 5 User Manual page 520

Internet security appliance
Hide thumbs Also See for ZyWALL 5:
Table of Contents

Advertisement

ZyWALL 5 Internet Security Appliance
LOG MESSAGE
Successful SSH login
SSH login failed
Successful HTTPS login
HTTPS login failed
LOG MESSAGE
%s exceeds the max. number
of session per host!
setNetBIOSFilter: calloc
error
readNetBIOSFilter: calloc
error
WAN connection is down.
LOG MESSAGE
Firewall default policy: [ TCP
| UDP | IGMP | ESP | GRE | OSPF
] <Packet Direction>
Firewall rule [NOT] match:[ TCP
| UDP | IGMP | ESP | GRE | OSPF
] <Packet Direction>, <rule:%d>
Triangle route packet
forwarded: [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
Packet without a NAT table
entry blocked: [ TCP | UDP |
IGMP | ESP | GRE | OSPF ]
Router sent blocked web site
message: TCP
LOG MESSAGE
Under SYN flood
attack, sent TCP RST
P-2
Chart P-1 System Maintenance Logs
Someone has logged on to the router's SSH server.
Someone has failed to log on to the router's SSH server.
Someone has logged on to the router's web configurator interface
using HTTPS protocol.
Someone has failed to log on to the router's web configurator
interface using HTTPS protocol.
Chart P-2 System Error Logs
This attempt to create a NAT session exceeds the maximum number of
NAT session table entries allowed to be created per host.
The router failed to allocate memory for the NetBIOS filter settings.
The router failed to allocate memory for the NetBIOS filter settings.
A WAN connection is down. You cannot access the network through
this interface.
Chart P-3 Access Control Logs
Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access matched the
default policy and was blocked or forwarded according to the
default policy's setting.
Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access matched (or
did not match) a configured firewall rule (denoted by its number)
and was blocked or forwarded according to the rule.
The firewall allowed a triangle route session to pass through.
The router blocked a packet that didn't have a corresponding NAT
table entry.
The router sent a message to notify a user that the router blocked
access to a web site that the user requested.
Chart P-4 TCP Reset Logs
The router sent a TCP reset packet when a host was under a SYN flood
attack (the TCP incomplete count is per destination host.)
DESCRIPTION
DESCRIPTION
DESCRIPTION
DESCRIPTION
Log Descriptions

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents