beautypg.com

Table 175 attack logs – ZyXEL Communications 5 Series User Manual

Page 515

background image

ZyWALL 5/35/70 Series User’s Guide

Chapter 30 Logs Screens

515

For type and code details, see

Table 183 on page 524

.

%s

When the content filter is not on according to the time schedule or you
didn't select the "Block Matched Web Site” check box, the system
forwards the web content.

Waiting content filter

server timeout

The external content filtering server did not respond within the timeout
period.

DNS resolving failed

The ZyWALL cannot get the IP address of the external content filtering
via DNS query.

Creating socket failed

The ZyWALL cannot issue a query because TCP/IP socket creation
failed, port:port number.

Connecting to content

filter server fail

The connection to the external content filtering server failed.

License key is invalid

The external content filtering license key is invalid.

Table 175 Attack Logs

LOG MESSAGE

DESCRIPTION

attack [ TCP | UDP | IGMP

| ESP | GRE | OSPF ]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.

attack ICMP (type:%d,

code:%d)

The firewall detected an ICMP attack.

land [ TCP | UDP | IGMP |

ESP | GRE | OSPF ]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land
attack.

land ICMP (type:%d,

code:%d)

The firewall detected an ICMP land attack.

ip spoofing - WAN [ TCP |

UDP | IGMP | ESP | GRE |

OSPF ]

The firewall detected an IP spoofing attack on the WAN port.

ip spoofing - WAN ICMP

(type:%d, code:%d)

The firewall detected an ICMP IP spoofing attack on the WAN port.

icmp echo : ICMP

(type:%d, code:%d)

The firewall detected an ICMP echo attack.

syn flood TCP

The firewall detected a TCP syn flood attack.

ports scan TCP

The firewall detected a TCP port scan attack.

teardrop TCP

The firewall detected a TCP teardrop attack.

teardrop UDP

The firewall detected an UDP teardrop attack.

teardrop ICMP (type:%d,

code:%d)

The firewall detected an ICMP teardrop attack.

illegal command TCP

The firewall detected a TCP illegal command attack.

NetBIOS TCP

The firewall detected a TCP NetBIOS attack.

ip spoofing - no routing

entry [ TCP | UDP | IGMP |

ESP | GRE | OSPF ]

The firewall classified a packet with no source routing entry as an
IP spoofing attack.

Table 174 Content Filtering Logs (continued)

LOG MESSAGE

DESCRIPTION