Table 18-1 Log Screen - ZyXEL Communications ZyWALL 10 User Manual

Internet security gateway
Hide thumbs Also See for ZyWALL 10:
Table of Contents

Advertisement

ZyWALL 10 Internet Security Gateway
Field
No.
Time
Packet Information
Reason
Action
Previous Page
Refresh
Clear
Next Page
Help
18-2

Table 18-1 Log Screen

This is the index number of the firewall log. 128 entries are available
numbered from 0 to 127. Once they are all used, the log will wrap around
and the old logs will be lost.
This is the time the log was recorded in this
format. You must configure Menu 24.10 for
real time; otherwise you get the time shown
in these examples.
This field lists packet information such as:
This field states the reason for
the log; i.e., was the rule
matched, not matched, or was
there an attack. The set and
rule coordinates (<X, Y> where
X=1,2; Y=00~10) follow with a
simple explanation. There are
two policy sets; set 1 (X = 1) is
for LAN to WAN rules and set 2
(X = 2) for WAN to LAN rules. Y
represents the rule in the set.
You can configure up to 10
rules in any set (Y = 01 to 10).
Rule number 00 is the default
rule.
This field displays whether the packet was blocked (i.e., silently discarded),
forwarded or neither (block, forward or none). "none" means that no action is
dictated by this rule.
Click this button to view the previous page in your log.
Click this button to renew the log screen.
Click this button to clear all the logs.
Click this button to view the next page in your log.
Click this button for some HTML Help on fields in this screen.
Description
dd:mm:yy
hh:mm:ss
From and To IP addresses
protocol and port numbers.
not match
<1,01> dest IP
This means this packet does not match
the destination IP address in set 1, rule
1. Other reasons (instead of dest IP) are
src IP, dest port, src port and protocol.
attack
land
This is a log is for a DoS attack – in this
case a land attack. Other attack types
are ip spoofing, icmp echo, icmp
vulnerability, NetBIOS, smtp illegal
command, traceroute, teardrop, or syn
flood. Please see section 14.1.2 and
Chapter 13 for a more detailed
discussion of what these attacks mean.
e.g., Jan 1 0
e.g., 00:00:00
Logs

Advertisement

Table of Contents
loading

Table of Contents