4 diagnostic, 2 call-triggering packet – ZyXEL Communications Parental Control Gateway HS100/HS100W User Manual
Page 291

HomeSafe User’s Guide
30-6
System Information and Diagnosis
5. Firewall log
Firewall Log Message Format
SdcmdSyslogSend(SYSLOG_FIREWALL, SYSLOG_NOTICE, buf);
buf = IP[Src=xx.xx.xx.xx : spo=xxxx Dst=xx.xx.xx.xx : dpo=xxxx | prot | rule | action]
Src: Source Address
spo: Source port (empty means no source port information)
Dst: Destination Address
dpo: Destination port (empty means no destination port information)
prot: Protocol (“TCP”,”UDP”,”ICMP”, ”IGMP”, ”GRE”, ”ESP”)
rule: where a means "set" number; b means "rule" number.
Action: nothing(N) block (B) forward (F)
08-01-2000 11:48:41
Local1.Notice
192.168.10.10
RAS: FW 172.21.1.80 :137 -
>172.21.1.80 :137 |UDP|default permit:<2,0>|B
08-01-2000 11:48:41
Local1.Notice
192.168.10.10
RAS: FW 192.168.77.88 :520 -
>192.168.77.88 :520 |UDP|default permit:<2,0>|B
08-01-2000 11:48:39
Local1.Notice
192.168.10.10
RAS: FW 172.21.1.50 ->172.21.1.50
|IGMP<2>|default permit:<2,0>|B
08-01-2000 11:48:39
Local1.Notice
192.168.10.10
RAS: FW 172.21.1.25 ->172.21.1.25
|IGMP<2>|default permit:<2,0>|B
30.3.2 Call-Triggering Packet
Call-Triggering Packet displays information about the packet that triggered a dial-out call in an
easy readable format. Equivalent information is available in menu 24.1 in hex format. An
example is shown next.
Figure 30-7 Call-Triggering Packet Example
30.4 Diagnostic
The diagnostic facility allows you to test the different aspects of your HomeSafe to determine if it
is working properly. Menu 24.4 allows you to choose among various types of diagnostic tests to
evaluate your system, as shown in the following figure.
Follow the procedure next to get to Diagnostic:
Step 1.
From the main menu, type 24 to open Menu 24 – System Maintenance.
Step 2.
From this menu, type 4 to open Menu 24.4 – System Maintenance – Diagnostic.
IP Frame: ENET0-RECV Size: 44/ 44 Time: 17:02:44.262
Frame Type:
IP Header:
IP Version = 4
Header Length = 20
Type of Service = 0x00 (0)
Total Length = 0x002C (44)
Identification = 0x0002 (2)
Flags = 0x00
Fragment Offset = 0x00
Time to Live = 0xFE (254)
Protocol = 0x06 (TCP)
Header Checksum = 0xFB20 (64288)
Source IP = 0xC0A80101 (192.168.1.1)
Destination IP = 0x00000000 (0.0.0.0)
TCP Header:
Source Port = 0x0401 (1025)
Destination Port = 0x000D (13)
Sequence Number = 0x05B8D000 (95997952)
Ack Number = 0x00000000 (0)
Header Length = 24
Flags = 0x02 (....S.)
Window Size = 0x2000 (8192)
Checksum = 0xE06A (57450)
Urgent Ptr = 0x0000 (0)
Options =
0000: 02 04 02 00
RAW DATA:
0000: 45 00 00 2C 00 02 00 00-FE 06 FB 20 C0 A8 01 01 E......... ....
0010: 00 00 00 00 04 01 00 0D-05 B8 D0 00 00 00 00 00 ................
0020: 60 02 20 00 E0 6A 00 00-02 04 02 00
Press any key to continue...