Netgear FVS338 FVS338 Reference Manual - Page 184

Table B-18. System Logs: Invalid Packets continued

Page 184 highlights

FVS338 ProSafe VPN Firewall 50 Reference Manual Table B-18. System Logs: Invalid Packets (continued) Recommended Action Message Explanation Recommended Action Message Explanation Recommended Action Message Explanation Recommended Action Message Explanation 1. Invalid packets are dropped. 2. Use this command to enable dropping and logging of the invalid packets: fw/rules/attackChecks/configure dropInvalid 1 To allow invalid packet and disable logging: fw/rules/attackChecks/configure dropInvalid 0 2007 Oct 1 00:44:17 [FVX538] [kernel] [INVALID][RST_PACKET][DROP] SRC=192.168.20.10 DST=192.168.20.2 PROTO=TCP SPT=23 DPT=54899 Invalid RST packet 1. Invalid packets are dropped. 2. Use this command to enable dropping and logging of the invalid packets: fw/rules/attackChecks/configure dropInvalid 1 To allow invalid packet and disable logging: fw/rules/attackChecks/configure dropInvalid 0 2007 Oct 1 00:44:17 [FVX538] [kernel] [INVALID][ICMP_TYPE][DROP] SRC=192.168.20.10 DST=192.168.20.2 PROTO=ICMP TYPE=19 CODE=0 Invalid ICMP Type 1. Invalid packets are dropped. 2. Use this command to enable dropping and logging of the invalid packets: fw/rules/attackChecks/configure dropInvalid 1 To allow invalid packet and disable logging: fw/rules/attackChecks/configure dropInvalid 0 2007 Oct 1 00:44:17 [FVX538] [kernel] [INVALID][TCP_FLAG_COMBINATION][DROP] SRC=192.168.20.10 DST=192.168.20.2 PROTO=TCP SPT=23 DPT=54899 Invalid TCP flag combination 1. Invalid packets are dropped. 2. Use this command to enable dropping and logging of the invalid packets: fw/rules/attackChecks/configure dropInvalid 1 To allow invalid packet and disable logging: fw/rules/attackChecks/configure dropInvalid 0 2007 Oct 1 00:44:17 [FVX538] [kernel] [INVALID][BAD_CHECKSUM]DROP] SRC=192.168.20.10 DST=192.168.20.2 PROTO=TCP SPT=23 DPT=54899 Bad Checksum B-12 v1.0, March 2008 System Logs and Error Messages

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198

FVS338 ProSafe VPN Firewall 50 Reference Manual
B-12
System Logs and Error Messages
v1.0, March 2008
Recommended Action
1.
Invalid packets are dropped.
2.
Use this command to enable dropping and logging of the invalid packets:
fw/rules/attackChecks/configure dropInvalid
1
To allow invalid packet and disable logging:
fw/rules/attackChecks/configure dropInvalid
0
Message
2007 Oct 1 00:44:17 [FVX538] [kernel]
[INVALID][RST_PACKET][DROP] SRC=192.168.20.10
DST=192.168.20.2 PROTO=TCP SPT=23 DPT=54899
Explanation
Invalid RST packet
Recommended Action
1.
Invalid packets are dropped.
2.
Use this command to enable dropping and logging of the invalid packets:
fw/rules/attackChecks/configure dropInvalid
1
To allow invalid packet and disable logging:
fw/rules/attackChecks/configure dropInvalid
0
Message
2007 Oct 1 00:44:17 [FVX538] [kernel]
[INVALID][ICMP_TYPE][DROP] SRC=192.168.20.10
DST=192.168.20.2 PROTO=ICMP TYPE=19 CODE=0
Explanation
Invalid ICMP Type
Recommended Action
1.
Invalid packets are dropped.
2.
Use this command to enable dropping and logging of the invalid packets:
fw/rules/attackChecks/configure dropInvalid
1
To allow invalid packet and disable logging:
fw/rules/attackChecks/configure dropInvalid
0
Message
2007 Oct 1 00:44:17 [FVX538] [kernel]
[INVALID][TCP_FLAG_COMBINATION][DROP] SRC=192.168.20.10
DST=192.168.20.2 PROTO=TCP SPT=23 DPT=54899
Explanation
Invalid TCP flag combination
Recommended Action
1.
Invalid packets are dropped.
2.
Use this command to enable dropping and logging of the invalid packets:
fw/rules/attackChecks/configure dropInvalid
1
To allow invalid packet and disable logging:
fw/rules/attackChecks/configure dropInvalid
0
Message
2007 Oct 1 00:44:17 [FVX538] [kernel]
[INVALID][BAD_CHECKSUM]DROP] SRC=192.168.20.10
DST=192.168.20.2 PROTO=TCP SPT=23 DPT=54899
Explanation
Bad Checksum
Table B-18. System Logs: Invalid Packets (continued)