beautypg.com

Table 165 attack logs – ZyXEL Communications 660HW Series User Manual

Page 444

background image

Prestige 660H/HW Series User’s Guide

443

Table 165 Attack Logs

LOG MESSAGE

DESCRIPTION

attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.

attack ICMP (type:%d,
code:%d)

The firewall detected an ICMP attack. For type and code details,

Table 168 on page 445

.

land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land

attack.

land ICMP (type:%d,
code:%d)

The firewall detected an ICMP land attack. For type and code

details,

Table 168 on page 445

.

ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]

The firewall detected an IP spoofing attack on the WAN port.

ip spoofing - WAN ICMP
(type:%d, code:%d)

The firewall detected an ICMP IP spoofing attack on the WAN port.

For type and code details,

Table 168 on page 445

.

icmp echo : ICMP
(type:%d, code:%d)

The firewall detected an ICMP echo attack. For type and code

details,

Table 168 on page 445

.

syn flood TCP

The firewall detected a TCP syn flood attack.

ports scan TCP

The firewall detected a TCP port scan attack.

teardrop TCP

The firewall detected a TCP teardrop attack.

teardrop UDP

The firewall detected an UDP teardrop attack.

teardrop ICMP (type:%d,
code:%d)

The firewall detected an ICMP teardrop attack. For type and code

details,

Table 168 on page 445

.

illegal command TCP

The firewall detected a TCP illegal command attack.

NetBIOS TCP

The firewall detected a TCP NetBIOS attack.

ip spoofing - no routing
entry [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]

The firewall classified a packet with no source routing entry as an

IP spoofing attack.

ip spoofing - no routing
entry ICMP (type:%d,
code:%d)

The firewall classified an ICMP packet with no source routing entry

as an IP spoofing attack.

vulnerability ICMP
(type:%d, code:%d)

The firewall detected an ICMP vulnerability attack. For type and

code details,

Table 168 on page 445

.

traceroute ICMP (type:%d,
code:%d)

The firewall detected an ICMP traceroute attack. For type and

code details,

Table 168 on page 445

.

This manual is related to the following products: