Firewall and NAT Alarms and Reports

Table A-9

Firewall and NAT Alarms (continued)

 

 

 

Severity

 

Report Text

 

 

 

3 - ERROR

 

Deny: ICMP unsupported packet %IP2_ICMP

 

 

 

3 - ERROR

 

Deny: java applet %CMD, %IP_P2

 

 

 

3 - ERROR

 

Deny: No filter for %s, %IP_2

 

 

 

3 - ERROR

 

Deny: No filter for ICMP, %IP_2

 

 

 

3 - ERROR

 

Deny: no matching filter, %IP2_ICMP

 

 

 

3 - ERROR

 

Deny: OSPF packet, %IP2

 

 

 

3 - ERROR

 

Deny: TCP Christmas Tree Packet, %IP_P2

 

 

 

3 - ERROR

 

Deny: TCP SYN+ACK packet blocked.

 

 

 

3 - ERROR

 

Deny: TCP SYN+ACK packet without ever seeing SYN packet. %IP_P2

 

 

 

3 - ERROR

 

Deny: TCP ACK packet, session not open %IP_P2

 

 

 

3 - ERROR

 

Deny: TCP Con_Req %IP_P2

 

 

 

3 - ERROR

 

Deny: TCP Conn IP_P2

 

 

 

3 - ERROR

 

Deny: TCP IN Con_Req - SYN Flood attack %IP_P2

 

 

 

3 - ERROR

 

Deny: TCP Possible break-in attempt, %IP_P2

 

 

 

3 - ERROR

 

Deny: TCP Un-Auth host %IP_P2

 

 

 

3 - ERROR

 

Deny: TCP, no policy, %IP_P2

 

 

 

3 - ERROR

 

Deny: UDP %IP_P2

 

 

 

3 - ERROR

 

Deny: UDP, no policy applies, %IP_P2

 

 

 

3 - ERROR

 

Deny: UDP, no policy, %IP_P2

 

 

 

3 - ERROR

 

Failed to allocate memory for a reply packet

 

 

 

3 - ERROR

 

Failed to install protected mode timer tick handler

 

 

 

3 - ERROR

 

ICMP Flood attack detected %IP_P2

 

 

 

3 - ERROR

 

Index of an inactive timer entry passed to osUntimeOut() call

 

 

 

3 - ERROR

 

Init: Failed to allocate memory for TimerEntries

 

 

 

3 - ERROR

 

Init: Failed to allocate memory for user authentication

 

 

 

3 - ERROR

 

Internal error

 

 

 

3 - ERROR

 

IP fragment cache entry purged

 

 

 

3 - ERROR

 

IP header checksum does not match, %IP_P2

 

 

 

3 - ERROR

 

osUnTimeOut() called with a bad index = %d

 

 

 

3 - ERROR

 

Received fragmented Packet without the initial fragment

 

 

 

3 - ERROR

 

TCP header checksum does not match, %IP_P2

 

 

 

3 - ERROR

 

TCP: ACK packet in the TCP three-way handshake sequence was blocked. %s

 

 

 

3 - ERROR

 

TCP: Detected possible process table attack using sequence number guessing. %IP_P2

 

 

 

3 - ERROR

 

TCP: Maximum allowed inbound connections exceeded from host %IP_P2

XSR User’s Guide A-17

Page 439
Image 439
Enterasys Networks X-PeditionTM manual Deny Icmp unsupported packet %IP2ICMP