beautypg.com

ZyXEL Communications ADSL VoIP IAD with 802.11g Wireless 2602HW Series User Manual

Page 499

background image

Prestige 2602HW Series User’s Guide

499

For type and code details, see

Table 190 on page 501

.

Table 185 UPnP Logs

LOG MESSAGE

DESCRIPTION

UPnP pass through Firewall

UPnP packets can pass through the firewall.

Table 186 Content Filtering Logs

LOG MESSAGE

DESCRIPTION

%s: block keyword

The content of a requested web page matched a user defined keyword.

%s

The system forwarded web content.

Table 187 Attack Logs

LOG MESSAGE

DESCRIPTION

attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.

attack ICMP (type:%d,
code:%d)

The firewall detected an ICMP attack.

land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land

attack.

land ICMP (type:%d,
code:%d)

The firewall detected an ICMP land attack.

ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]

The firewall detected an IP spoofing attack on the WAN port.

ip spoofing - WAN ICMP
(type:%d, code:%d)

The firewall detected an ICMP IP spoofing attack on the WAN port.

icmp echo : ICMP
(type:%d, code:%d)

The firewall detected an ICMP echo attack.

syn flood TCP

The firewall detected a TCP syn flood attack.

ports scan TCP

The firewall detected a TCP port scan attack.

teardrop TCP

The firewall detected a TCP teardrop attack.

teardrop UDP

The firewall detected an UDP teardrop attack.

teardrop ICMP (type:%d,
code:%d)

The firewall detected an ICMP teardrop attack.

illegal command TCP

The firewall detected a TCP illegal command attack.

NetBIOS TCP

The firewall detected a TCP NetBIOS attack.

ip spoofing - no routing
entry [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]

The firewall classified a packet with no source routing entry as an

IP spoofing attack.