ZyXEL ZyWALL 5 User Guide - Page 568
Table 183, Table 184
View all ZyXEL ZyWALL 5 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 568 highlights
Chapter 32 Logs Screens 568 Table 183 Content Filtering Logs LOG MESSAGE DESCRIPTION %s: Keyword blocking The content of a requested web page matched a user defined keyword. %s: Not in trusted web The web site is not in a trusted domain, and the router blocks all traffic list except trusted domain sites. %s: Forbidden Web site The web site is in the forbidden web site list. %s: Contains ActiveX The web site contains ActiveX. %s: Contains Java applet The web site contains a Java applet. %s: Contains cookie The web site contains a cookie. %s: Proxy mode detected The router detected proxy mode in the packet. %s The content filter server responded that the web site is in the blocked category list, but it did not return the category type. %s: %s The content filter server responded that the web site is in the blocked category list, and returned the category type. %s(cache hit) The system detected that the web site is in the blocked list from the local cache, but does not know the category type. %s :%s(cache hit) The system detected that the web site is in blocked list from the local cache, and knows the category type. %s: Trusted Web site The web site is in a trusted domain. %s When the content filter is not on according to the time schedule or you didn't select the "Block Matched Web Site" check box, the system forwards the web content. Waiting content filter The external content filtering server did not respond within the timeout server timeout period. DNS resolving failed The ZyWALL cannot get the IP address of the external content filtering via DNS query. Creating socket failed The ZyWALL cannot issue a query because TCP/IP socket creation failed, port: port number. Connecting to content The connection to the external content filtering server failed. filter server fail License key is invalid The external content filtering license key is invalid. For type and code details, see Table 192 on page 578. Table 184 Attack Logs LOG MESSAGE DESCRIPTION attack [ TCP | UDP | IGMP The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack. | ESP | GRE | OSPF ] attack ICMP (type:%d, code:%d) The firewall detected an ICMP attack. land [ TCP | UDP | IGMP | The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land ESP | GRE | OSPF ] attack. land ICMP (type:%d, code:%d) The firewall detected an ICMP land attack. ZyWALL 5/35/70 Series User's Guide