ZyXEL P-660HN-51 User Guide - Page 217
Table 82, Table 83, Table 84, Table 81
View all ZyXEL P-660HN-51 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 217 highlights
Chapter 20 Logs Table 81 PPP Logs (continued) LOG MESSAGE DESCRIPTION ppp:LCP Closing The PPP connection's Link Control Protocol stage is closing. ppp:IPCP Closing The PPP connection's Internet Protocol Control Protocol stage is closing. Table 82 UPnP Logs LOG MESSAGE UPnP pass through Firewall DESCRIPTION UPnP packets can pass through the firewall. Table 83 Content Filtering Logs LOG MESSAGE DESCRIPTION %s: block keyword The content of a requested web page matched a user defined keyword. %s The system forwarded web content. For type and code details, see Table 87 on page 219. Table 84 Attack Logs LOG MESSAGE attack [ TCP | UDP | IGMP | ESP | GRE | OSPF ] attack ICMP (type:%d, code:%d) land [ TCP | UDP | IGMP | ESP | GRE | OSPF ] land ICMP (type:%d, code:%d) ip spoofing - WAN [ TCP | UDP | IGMP | ESP | GRE | OSPF ] ip spoofing - WAN ICMP (type:%d, code:%d) icmp echo : ICMP (type:%d, code:%d) syn flood TCP ports scan TCP teardrop TCP teardrop UDP teardrop ICMP (type:%d, code:%d) illegal command TCP DESCRIPTION The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack. The firewall detected an ICMP attack. The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land attack. The firewall detected an ICMP land attack. The firewall detected an IP spoofing attack on the WAN port. The firewall detected an ICMP IP spoofing attack on the WAN port. The firewall detected an ICMP echo attack. The firewall detected a TCP syn flood attack. The firewall detected a TCP port scan attack. The firewall detected a TCP teardrop attack. The firewall detected an UDP teardrop attack. The firewall detected an ICMP teardrop attack. The firewall detected a TCP illegal command attack. P-660HN-TxA User's Guide 217