ZyXEL Communications P-660HN-TxA User Manual
Page 218

Chapter 20 Logs
P-660HN-TxA User’s Guide
218
NetBIOS TCP
The firewall detected a TCP NetBIOS attack.
ip spoofing - no routing
entry [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
The firewall classified a packet with no source routing
entry as an IP spoofing attack.
ip spoofing - no routing
entry ICMP (type:%d,
code:%d)
The firewall classified an ICMP packet with no source
routing entry as an IP spoofing attack.
vulnerability ICMP
(type:%d, code:%d)
The firewall detected an ICMP vulnerability attack.
traceroute ICMP (type:%d,
code:%d)
The firewall detected an ICMP traceroute attack.
Table 85 802.1X Logs
LOG MESSAGE
DESCRIPTION
RADIUS accepts user.
A user was authenticated by the RADIUS Server.
RADIUS rejects user. Pls check
RADIUS Server.
A user was not authenticated by the RADIUS
Server. Please check the RADIUS Server.
User logout because of session
timeout expired.
The router logged out a user whose session
expired.
User logout because of user
deassociation.
The router logged out a user who ended the
session.
User logout because of no
authentication response from
user.
The router logged out a user from which there
was no authentication response.
User logout because of idle
timeout expired.
The router logged out a user whose idle timeout
period expired.
User logout because of user
request.
A user logged out.
No response from RADIUS. Pls
check RADIUS Server.
There is no response message from the RADIUS
server, please check the RADIUS server.
Use RADIUS to authenticate user.
The RADIUS server is operating as the
authentication server.
No Server to authenticate user.
There is no authentication server to authenticate
a user.
Table 86 ACL Setting Notes
PACKET
DIRECTION
DIRECTION
DESCRIPTION
(L to W)
LAN to WAN
ACL set for packets traveling from the LAN to the
WAN.
(W to L)
WAN to LAN
ACL set for packets traveling from the WAN to the
LAN.
Table 84 Attack Logs (continued)
LOG MESSAGE
DESCRIPTION