Table 71 Content Filtering Logs; Table 72 Attack Logs - ZyXEL Communications MAX-200M1 Series User Manual

Ieee 802.16e simple indoor cpe
Hide thumbs Also See for MAX-200M1 Series:
Table of Contents

Advertisement

ZyXEL MAX-200M1 Series User's Guide

Table 71 Content Filtering Logs

LOG MESSAGE
%s: Keyword blocking
%s: Not in trusted web
list
%s: Forbidden Web site The web site is in the forbidden web site list.
%s: Contains ActiveX
%s: Contains Java
applet
%s: Contains cookie
%s: Proxy mode
detected
%s: Trusted Web site
%s
Waiting content filter
server timeout
DNS resolving failed
Creating socket failed The ZyXEL Device cannot issue a query because TCP/IP socket
Connecting to content
filter server fail
License key is invalid The external content filtering license key is invalid.
For type and code details, see

Table 72 Attack Logs

LOG MESSAGE
attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
attack ICMP (type:%d,
code:%d)
land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
land ICMP (type:%d,
code:%d)
ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]
ip spoofing - WAN ICMP
(type:%d, code:%d)
icmp echo : ICMP
(type:%d, code:%d)
186
DESCRIPTION
The content of a requested web page matched a user defined keyword.
The web site is not in a trusted domain, and the router blocks all traffic
except trusted domain sites.
The web site contains ActiveX.
The web site contains a Java applet.
The web site contains a cookie.
The router detected proxy mode in the packet.
The web site is in a trusted domain.
When the content filter is not on according to the time schedule.
The external content filtering server did not respond within the timeout
period.
The ZyXEL Device cannot get the IP address of the external content
filtering via DNS query.
creation failed, port:port number.
The connection to the external content filtering server failed.
Table 74 on page
188.
DESCRIPTION
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
The firewall detected an ICMP attack.
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land
attack.
The firewall detected an ICMP land attack.
The firewall detected an IP spoofing attack on the WAN port.
The firewall detected an ICMP IP spoofing attack on the WAN port.
The firewall detected an ICMP echo attack.
Chapter 18 Logs

Advertisement

Table of Contents
loading

Table of Contents