4 diagnostic, 2 call-triggering packet – ZyXEL Communications Parental Control Gateway HS100/HS100W User Manual
Page 291

HomeSafe User’s Guide
30-6
System Information and Diagnosis
5. Firewall log
Firewall Log Message Format
SdcmdSyslogSend(SYSLOG_FIREWALL, SYSLOG_NOTICE, buf); 
buf = IP[Src=xx.xx.xx.xx : spo=xxxx Dst=xx.xx.xx.xx : dpo=xxxx | prot | rule | action] 
Src: Source Address 
spo: Source port (empty means no source port information) 
Dst: Destination Address 
dpo: Destination port (empty means no destination port information) 
prot: Protocol (“TCP”,”UDP”,”ICMP”, ”IGMP”, ”GRE”, ”ESP”) 
rule:  where a means "set" number; b means "rule" number. 
Action: nothing(N) block (B) forward (F) 
08-01-2000 11:48:41 
Local1.Notice
192.168.10.10
RAS: FW 172.21.1.80 :137 -
>172.21.1.80 :137 |UDP|default permit:<2,0>|B 
08-01-2000 11:48:41 
Local1.Notice
192.168.10.10
RAS: FW 192.168.77.88 :520 -
>192.168.77.88 :520 |UDP|default permit:<2,0>|B 
08-01-2000 11:48:39 
Local1.Notice
192.168.10.10
RAS: FW 172.21.1.50 ->172.21.1.50
|IGMP<2>|default permit:<2,0>|B 
08-01-2000 11:48:39 
Local1.Notice
192.168.10.10
RAS: FW 172.21.1.25 ->172.21.1.25
|IGMP<2>|default permit:<2,0>|B
30.3.2 Call-Triggering Packet
Call-Triggering Packet displays information about the packet that triggered a dial-out call in an 
easy readable format. Equivalent information is available in menu 24.1 in hex format. An 
example is shown next. 
Figure 30-7 Call-Triggering Packet Example
30.4 Diagnostic
The diagnostic facility allows you to test the different aspects of your HomeSafe to determine if it 
is working properly. Menu 24.4 allows you to choose among various types of diagnostic tests to 
evaluate your system, as shown in the following figure. 
Follow the procedure next to get to Diagnostic:
Step 1.
From the main menu, type 24 to open Menu 24 – System Maintenance.
Step 2.
From this menu, type 4 to open Menu 24.4 – System Maintenance – Diagnostic.
IP Frame: ENET0-RECV Size: 44/ 44 Time: 17:02:44.262 
 Frame Type: 
 
 IP Header: 
 IP Version = 4 
 Header Length = 20 
 Type of Service = 0x00 (0) 
 Total Length = 0x002C (44) 
 Identification = 0x0002 (2) 
 Flags = 0x00 
 Fragment Offset = 0x00 
 Time to Live = 0xFE (254) 
 Protocol = 0x06 (TCP) 
 Header Checksum = 0xFB20 (64288) 
 Source IP = 0xC0A80101 (192.168.1.1) 
 Destination IP = 0x00000000 (0.0.0.0) 
 
 TCP Header: 
 Source Port = 0x0401 (1025) 
 Destination Port = 0x000D (13) 
 Sequence Number = 0x05B8D000 (95997952) 
 Ack Number = 0x00000000 (0) 
 Header Length = 24 
 Flags = 0x02 (....S.) 
 Window Size = 0x2000 (8192) 
 Checksum = 0xE06A (57450) 
 Urgent Ptr = 0x0000 (0) 
 Options = 
 0000: 02 04 02 00 
 
 RAW DATA: 
 0000: 45 00 00 2C 00 02 00 00-FE 06 FB 20 C0 A8 01 01 E......... .... 
 0010: 00 00 00 00 04 01 00 0D-05 B8 D0 00 00 00 00 00 ................ 
 0020: 60 02 20 00 E0 6A 00 00-02 04 02 00 
Press any key to continue... 
