beautypg.com

4 diagnostic, 2 call-triggering packet – ZyXEL Communications Parental Control Gateway HS100/HS100W User Manual

Page 291

background image

HomeSafe User’s Guide

30-6

System Information and Diagnosis

5. Firewall log

Firewall Log Message Format

SdcmdSyslogSend(SYSLOG_FIREWALL, SYSLOG_NOTICE, buf);
buf = IP[Src=xx.xx.xx.xx : spo=xxxx Dst=xx.xx.xx.xx : dpo=xxxx | prot | rule | action]

Src: Source Address
spo: Source port (empty means no source port information)
Dst: Destination Address
dpo: Destination port (empty means no destination port information)
prot: Protocol (“TCP”,”UDP”,”ICMP”, ”IGMP”, ”GRE”, ”ESP”)
rule: where a means "set" number; b means "rule" number.
Action: nothing(N) block (B) forward (F)
08-01-2000 11:48:41

Local1.Notice

192.168.10.10

RAS: FW 172.21.1.80 :137 -

>172.21.1.80 :137 |UDP|default permit:<2,0>|B
08-01-2000 11:48:41

Local1.Notice

192.168.10.10

RAS: FW 192.168.77.88 :520 -

>192.168.77.88 :520 |UDP|default permit:<2,0>|B
08-01-2000 11:48:39

Local1.Notice

192.168.10.10

RAS: FW 172.21.1.50 ->172.21.1.50

|IGMP<2>|default permit:<2,0>|B
08-01-2000 11:48:39

Local1.Notice

192.168.10.10

RAS: FW 172.21.1.25 ->172.21.1.25

|IGMP<2>|default permit:<2,0>|B

30.3.2 Call-Triggering Packet

Call-Triggering Packet displays information about the packet that triggered a dial-out call in an
easy readable format. Equivalent information is available in menu 24.1 in hex format. An
example is shown next.

Figure 30-7 Call-Triggering Packet Example

30.4 Diagnostic

The diagnostic facility allows you to test the different aspects of your HomeSafe to determine if it
is working properly. Menu 24.4 allows you to choose among various types of diagnostic tests to
evaluate your system, as shown in the following figure.

Follow the procedure next to get to Diagnostic:

Step 1.

From the main menu, type 24 to open Menu 24 – System Maintenance.

Step 2.

From this menu, type 4 to open Menu 24.4 System Maintenance Diagnostic.

IP Frame: ENET0-RECV Size: 44/ 44 Time: 17:02:44.262
Frame Type:

IP Header:
IP Version = 4
Header Length = 20
Type of Service = 0x00 (0)
Total Length = 0x002C (44)
Identification = 0x0002 (2)
Flags = 0x00
Fragment Offset = 0x00
Time to Live = 0xFE (254)
Protocol = 0x06 (TCP)
Header Checksum = 0xFB20 (64288)
Source IP = 0xC0A80101 (192.168.1.1)
Destination IP = 0x00000000 (0.0.0.0)

TCP Header:
Source Port = 0x0401 (1025)
Destination Port = 0x000D (13)
Sequence Number = 0x05B8D000 (95997952)
Ack Number = 0x00000000 (0)
Header Length = 24
Flags = 0x02 (....S.)
Window Size = 0x2000 (8192)
Checksum = 0xE06A (57450)
Urgent Ptr = 0x0000 (0)
Options =
0000: 02 04 02 00

RAW DATA:
0000: 45 00 00 2C 00 02 00 00-FE 06 FB 20 C0 A8 01 01 E......... ....
0010: 00 00 00 00 04 01 00 0D-05 B8 D0 00 00 00 00 00 ................
0020: 60 02 20 00 E0 6A 00 00-02 04 02 00
Press any key to continue...