Table 160 acl setting notes table 161 icmp notes – ZyXEL Communications Prestige 2602R Series User Manual
Page 432
Prestige 2602R Series User’s Guide
432
Appendix K Log Descriptions
ip spoofing - no routing
entry ICMP (type:%d,
code:%d)
The firewall classified an ICMP packet with no source routing entry
as an IP spoofing attack.
vulnerability ICMP
(type:%d, code:%d)
The firewall detected an ICMP vulnerability attack.
traceroute ICMP (type:%d,
code:%d)
The firewall detected an ICMP traceroute attack.
Table 160 ACL Setting Notes
PACKET DIRECTION
DIRECTION
DESCRIPTION
(L to W)
LAN to WAN
ACL set for packets traveling from the LAN to the WAN.
(W to L)
WAN to LAN
ACL set for packets traveling from the WAN to the LAN.
(L to L/Prestige)
LAN to LAN/
Prestige
ACL set for packets traveling from the LAN to the LAN or
the Prestige.
(W to W/Prestige)
WAN to WAN/
Prestige
ACL set for packets traveling from the WAN to the WAN
or the Prestige.
Table 161 ICMP Notes
TYPE
CODE
DESCRIPTION
0
Echo Reply
0
Echo reply message
3
Destination Unreachable
0
Net unreachable
1
Host unreachable
2
Protocol unreachable
3
Port unreachable
4
A packet that needed fragmentation was dropped because it was set to Don't
Fragment (DF)
5
Source route failed
4
Source Quench
0
A gateway may discard internet datagrams if it does not have the buffer space
needed to queue the datagrams for output to the next network on the route to
the destination network.
5
Redirect
0
Redirect datagrams for the Network
1
Redirect datagrams for the Host
2
Redirect datagrams for the Type of Service and Network
Table 159 Attack Logs (continued)
LOG MESSAGE
DESCRIPTION