Firewall and NAT Alarms and Reports

Table A-9 Firewall and NAT Alarms (continued)

Severity

Report Text

 

 

 

3

- ERROR

NAT: No NAT entry found, %IP_P2

 

 

 

3

- ERROR

NAT: TCP reset, NAT port %d, %IP_P2

 

 

 

3

- ERROR

UDP: NAT unable to forward packet, %IP_P2

 

 

 

4

- WARNING

NAT table is full

 

 

 

4

- WARNING

NAT: TCP connection closed, freeing NAT port %d

 

 

 

4

- WARNING

Purging NAT Entry for port %d

 

 

5- NOTICE

NAT: Failed to send ARP Request packet to %IP1

 

 

5- NOTICE

NAT: Failed to send ARP Request packet to default router %IP1

 

 

 

0

- EMERG

Init: Failed to allocate external host memory

 

 

 

0

- EMERG

Init: Failed to allocate memory for auth host table

 

 

 

0

- EMERG

Init: Failed to allocate memory for Fragmentation cache

 

 

 

0

- EMERG

Init: Failed to allocate memory for FTP Request pool

 

 

 

0

- EMERG

Init: Failed to allocate memory for UDP Request pool

 

 

 

0

- EMERG

Init: Failed to allocate session memory

 

 

 

0

- EMERG

Init: Session Mgr Failed to create aging timer

 

 

 

0

- EMERG

Init: Session Mgr failed to create FloodCheck timer

 

 

 

1

- ALERT

Deny: TCP SYN backlog queue is full. %IP_P2

 

 

 

1

- ALERT

Deny: TCP SYN+ACK backlog queue is full. %IP_P2

 

 

 

1

- ALERT

Empty IP fragment

 

 

 

1

- ALERT

External Host pool exhausted

 

 

 

1

- ALERT

FTP PORT Command has bad IP Address %IP2

 

 

 

1

- ALERT

Init: Error reading ActiveX filter

 

 

 

1

- ALERT

IP fragment offset plus length exceeds the maximum IP datagram length

 

 

 

1

- ALERT

IP fragment with negative fragmentation offset

 

 

 

1

- ALERT

Maximum fragments for a single IP packet reached

 

 

 

1

- ALERT

Session pool exhausted

 

 

 

1

- ALERT

TCP: Detected portscan. %IP_P2

 

 

 

1

- ALERT

TCP: Detected SYN Flood attack. %IP_P2

 

 

 

1

- ALERT

TCP: Duplicated session %IP_P2

 

 

 

1

- ALERT

TCP: External host already exists %IP_P2

 

 

 

1

- ALERT

TearDrop-like attack: invalid fragmentation offset value

 

 

 

1

- ALERT

UDP fragmentation attack: constructed payload larger than specified in UDP header

 

 

 

1

- ALERT

UDP fragmentation attack: constructed payload less than specified in the UDP header

 

 

 

1

- ALERT

UDP: Duplicated session %IP_P2

XSR User’s Guide A-15

Page 437
Image 437
Enterasys Networks X-PeditionTM manual NAT TCP reset, NAT port %d, %IPP2