ZyXEL Communications Prestige 662HW Series User Manual page 448

802.11g wireless adsl 2+ 4 port security gateway
Hide thumbs Also See for Prestige 662HW Series:
Table of Contents

Advertisement

Prestige 662HW Series User's Guide
MESSAGE
(Destination)
Keyword Blocking
(Destination)
Contains ActiveX
(Destination)
Contains Java
applet
(Destination)
Contains cookie
(Destination)
Proxy mode
detected
(Destination)
The attack logs may include the protocol (Protocol) of the packet (for example TCP or UDP) that
triggered the log.
LOG MESSAGE
attack (Protocol)
land Protocol)
icmp echo ICMP
(type:%d, code:%d)
syn flood TCP
ports scan TCP
teardrop (Protocol)
illegal command TCP
NetBIOS TCP
ip spoofing - no
routing entry
(Protocol)
vulnerability ICMP
(type:%d, code:%d)
traceroute ICMP
(type:%d, code:%d)
Access logs may include the following information:
H-2
Chart H-3 Content Filtering Logs
NOTE
Web Block
The Prestige blocked access to an address or domain name
that had a forbidden keyword.
Web Block
The Prestige blocked access to an IP address or domain
name that contains ActiveX because the content filter is set to
forbid ActiveX.
Web Block
The Prestige blocked access to an IP address or domain
name that contains a Java applet because the content filter is
set to forbid Java applets.
Web Block
The Prestige blocked access to an IP address or domain
name that contains a cookie because the content filter is set to
forbid cookies.
Web Block
The Prestige blocked access to an IP address or domain
name that contains a proxy because the content filter is set to
forbid proxies.
Web
The Prestige allowed access to an address or domain name
Forward
when content filtering was turned off according to its schedule.
Chart H-4 Attack Logs
The firewall detected an attack. The log may also display the protocol
(for example TCP or UDP).
The firewall detected a land attack. The log may also display the
protocol (for example TCP or UDP).
The firewall detected an ICMP echo attack. See the section on ICMP
messages for type and code details.
The firewall detected a TCP syn flood attack.
The firewall detected a TCP port scan attack.
The firewall detected a teardrop attack.
The firewall detected a TCP SMTP illegal command attack.
The firewall detected a TCP NetBIOS attack.
The firewall detected an IP spoofing attack while the Prestige did not
have a default route. The log may also display the protocol (for
example TCP or UDP).
The firewall detected an ICMP vulnerability attack; see the section on
ICMP messages for type and code details.
The firewall detected an ICMP traceroute attack; see the
section on ICMP messages for type and code details.
DESCRIPTION
DESCRIPTION
Log Descriptions

Advertisement

Table of Contents
loading

Table of Contents