ZyXEL P-2024 User Guide - Page 111

Table 45, Logs, P-2024 User's Guide, System Maintenance Logs, TCP Reset Logs

Page 111 highlights

Chapter 11 Logs Table 45 System Maintenance Logs LOG MESSAGE DESCRIPTION Time synchronization is successful The device has adjusted its time based on information from the time server. Time synchronization failed The device failed to get information from the time server. WAN interface gets IP: %s The WAN interface got a new IP address from the DHCP or PPPoE server. DHCP client IP expired A DHCP client's IP address has expired. DHCP server assigns %s The DHCP server assigned an IP address to a client. Successful WEB login Someone has logged on to the device's web configurator interface. WEB login failed Someone has failed to log on to the device's web configurator interface. Successful TELNET login Someone has logged on to the router via telnet. TELNET login failed Someone has failed to log on to the router via telnet. Successful FTP login Someone has logged on to the device via ftp. FTP login failed Someone has failed to log on to the device via ftp. NAT Session Table is Full! The maximum number of NAT session table entries has been exceeded and the table is full. Time initialized by Datetime The device got the time and date from the Datetime server. server: %s Time initialized by Time server The device got the time and date from the time server. Time initialized by NTP server The device got the time and date from the NTP server. Failed to sync with Daytime The device was not able to connect to the Daytime server. server: %s Failed to sync with Time server: %s The device was not able to connect to the Time server. Failed to sync with NTP server: %s The device was not able to connect to the NTP server. Too large ICMP packet has been dropped The device dropped an ICMP packet that was too large. Configuration Change: PC = 0x%x, Task ID = 0x%x The device is saving configuration changes. Table 46 TCP Reset Logs LOG MESSAGE Under SYN flood attack, sent TCP RST Exceed TCP MAX incomplete, sent TCP RST DESCRIPTION The router sent a TCP reset packet when a host was under a SYN flood attack (the TCP incomplete count is per destination host.) The router sent a TCP reset packet when the number of TCP incomplete connections exceeded the user configured threshold. (the TCP incomplete count is per destination host.) P-2024 User's Guide 111

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206

Chapter 11 Logs
P-2024 User’s Guide
111
Table 45
System Maintenance Logs
LOG MESSAGE
DESCRIPTION
Time synchronization is
successful
The device has adjusted its time based on information from
the time server.
Time synchronization failed
The device failed to get information from the time server.
WAN interface gets IP: %s
The WAN interface got a new IP address from the DHCP or
PPPoE server.
DHCP client IP expired
A DHCP client's IP address has expired.
DHCP server assigns %s
The DHCP server assigned an IP address to a client.
Successful WEB login
Someone has logged on to the device's web configurator
interface.
WEB login failed
Someone has failed to log on to the device's web configurator
interface.
Successful TELNET login
Someone has logged on to the router via telnet.
TELNET login failed
Someone has failed to log on to the router via telnet.
Successful FTP login
Someone has logged on to the device via ftp.
FTP login failed
Someone has failed to log on to the device via ftp.
NAT Session Table is Full!
The maximum number of NAT session table entries has been
exceeded and the table is full.
Time initialized by Datetime
server: %s
The device got the time and date from the Datetime server.
Time initialized by Time
server
The device got the time and date from the time server.
Time initialized by NTP
server
The device got the time and date from the NTP server.
Failed to sync with Daytime
server: %s
The device was not able to connect to the Daytime server.
Failed to sync with Time
server: %s
The device was not able to connect to the Time server.
Failed to sync with NTP
server: %s
The device was not able to connect to the NTP server.
Too large ICMP packet has
been dropped
The device dropped an ICMP packet that was too large.
Configuration Change: PC =
0x%x, Task ID = 0x%x
The device is saving configuration changes.
Table 46
TCP Reset Logs
LOG MESSAGE
DESCRIPTION
Under SYN flood attack,
sent TCP RST
The router sent a TCP reset packet when a host was under a SYN
flood attack (the TCP incomplete count is per destination host.)
Exceed TCP MAX
incomplete, sent TCP RST
The router sent a TCP reset packet when the number of TCP
incomplete connections exceeded the user configured threshold.
(the TCP incomplete count is per destination host.)