ZyXEL P-202H Plus User Guide - Page 233
P-202H Plus v2 User's Guide, Enabling the Firewall, View Firewall Log
View all ZyXEL P-202H Plus manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 233 highlights
P-202H Plus v2 User's Guide Table 77 View Firewall Log FIELD DESCRIPTION EXAMPLES # This is the index number of the firewall log. 128 entries 23 are available numbered from 0 to 127. Once they are all used, the log wraps around and the old logs are lost. Time This is the time the log was recorded in this format. You mm:dd:yy: e.g., Jan 1 00 must configure menu 24.10 for real time; otherwise the hh:mm:ss: e.g., 00:00:00 clock will start at 2000/01/01 00:00:00 the last time the ZyXEL Device was reset. Packet Information This field lists packet information such as protocol and src/dest port numbers (TCP, UDP), or protocol, type and code (ICMP). From and To IP addresses Protocol and port numbers Reason This field states the reason for the log; i.e., was the rule matched, did not match or was there an attack. The set and rule coordinates ( where X=1,2; Y=00~10) follow with a simple explanation. There are two policy sets; set 1 (X = 1) is for LAN to WAN rules and set 2 (X = 2) for WAN to LAN rules. Y represents the rule in the set. You can configure up to 10 rules in any set (Y = 01 to 10). Rule number 00 is the default rule. not match dest IP This means this packet does not match the destination IP address in set 1, rule 1. Other reasons (instead of dest IP) are src IP, dest port, src port and protocol. This is a log for a DoS attack. attack land, ip spoofing, icmp echo, icmp vulnerability, NetBIOS, smtp illegal command, traceroute, teardrop or syn flood Action This field displays whether the packet was blocked or forwarded. None means that no action is dictated by this rule. block, forward or none After viewing the firewall log, ENTER "y" to clear the log or "n" to retain it. With either option you will be returned to Menu 21- Filter and Firewall Setup. Chapter 24 Enabling the Firewall 232