ZyXEL P-2802HWL-I1 User Guide - Page 295
Table 119, Table 120, Table 121
View all ZyXEL P-2802HWL-I1 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 295 highlights
Chapter 22 Logs Table 119 System Error Logs LOG MESSAGE %s exceeds the max. number of session per host! setNetBIOSFilter: calloc error readNetBIOSFilter: calloc error WAN connection is down. DESCRIPTION This attempt to create a NAT session exceeds the maximum number of NAT session table entries allowed to be created per host. The router failed to allocate memory for the NetBIOS filter settings. The router failed to allocate memory for the NetBIOS filter settings. A WAN connection is down. You cannot access the network through this interface. Table 120 Access Control Logs LOG MESSAGE Firewall default policy: [ TCP | UDP | IGMP | ESP | GRE | OSPF ] Firewall rule [NOT] match:[ TCP | UDP | IGMP | ESP | GRE | OSPF ] , Triangle route packet forwarded: [ TCP | UDP | IGMP | ESP | GRE | OSPF ] Packet without a NAT table entry blocked: [ TCP | UDP | IGMP | ESP | GRE | OSPF ] Router sent blocked web site message: TCP DESCRIPTION Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access matched the default policy and was blocked or forwarded according to the default policy's setting. Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access matched (or did not match) a configured firewall rule (denoted by its number) and was blocked or forwarded according to the rule. The firewall allowed a triangle route session to pass through. The router blocked a packet that didn't have a corresponding NAT table entry. The router sent a message to notify a user that the router blocked access to a web site that the user requested. Table 121 TCP Reset Logs LOG MESSAGE Under SYN flood attack, sent TCP RST Exceed TCP MAX incomplete, sent TCP RST Peer TCP state out of order, sent TCP RST Firewall session time out, sent TCP RST DESCRIPTION The router sent a TCP reset packet when a host was under a SYN flood attack (the TCP incomplete count is per destination host.) The router sent a TCP reset packet when the number of TCP incomplete connections exceeded the user configured threshold. (the TCP incomplete count is per destination host.) Note: Refer to TCP Maximum Incomplete in the Firewall Attack Alerts screen. The router sent a TCP reset packet when a TCP connection state was out of order.Note: The firewall refers to RFC793 Figure 6 to check the TCP state. The router sent a TCP reset packet when a dynamic firewall session timed out.Default timeout values:ICMP idle timeout (s): 60UDP idle timeout (s): 60TCP connection (three way handshaking) timeout (s): 30TCP FIN-wait timeout (s): 60TCP idle (established) timeout (s): 3600 P-2802H(W)(L)-I Series User's Guide 295