FVS338 ProSafe VPN Firewall 50 Reference Manual

LAN to WAN Logs

Table B-19. Routing Logs: LAN to WAN

Message

Nov 29 09:19:43 [FVS338] [kernel] LAN2WAN[ACCEPT] IN=LAN OUT=WAN

 

SRC=192.168.10.10 DST=72.14.207.99 PROTO=ICMP TYPE=8 CODE=0

 

 

 

Explanation

• This packet from LAN to WAN has been allowed by the firewall.

 

 

• For other parameters, refer to Table B-1.

 

Recommended Action

None

 

 

 

 

LAN to DMZ Logs

 

Table B-20. Routing Logs: LAN to DMZ

 

 

 

Message

Nov 29 09:44:06 [FVS338] [kernel] LAN2DMZ[ACCEPT] IN=LAN OUT=DMZ

 

SRC=192.168.10.10 DST=192.168.20.10 PROTO=ICMP TYPE=8 CODE=0

 

 

 

Explanation

• This packet from LAN to DMZ has been allowed by the firewall.

 

 

• For other parameters, refer to Table B-1.

 

 

 

 

Recommended Action

None

 

 

 

 

DMZ to WAN Logs

 

Table B-21. Routing Logs: DMZ to WAN

 

 

 

Message

Nov 29 09:19:43 [FVS338] [kernel] DMZ2WAN[DROP] IN=DMZ OUT=WAN

 

SRC=192.168.20.10 DST=72.14.207.99 PROTO=ICMP TYPE=8 CODE=0

 

 

 

Explanation

• This packet from DMZ to WAN has been dropped by the firewall.

 

 

• For other parameters, refer to Table B-1.

 

 

 

 

Recommended Action

None

 

 

 

 

WAN to LAN Logs

 

Table B-22. Routing Logs: WAN to LAN

 

 

 

Message

Nov 29 10:05:15 [FVS338] [kernel] WAN2LAN[ACCEPT] IN=WAN OUT=LAN

 

SRC=192.168.1.214 DST=192.168.10.10 PROTO=ICMP TYPE=8 CODE=0

Explanation

• This packet from LAN to WAN has been allowed by the firewall

 

 

• For other parameters, refer to Table B-1.

 

Recommended Action

None

 

 

 

 

 

 

 

System Logs and Error Messages

B-15

v1.0, March 2008

Page 187
Image 187
NETGEAR FVS338 manual LAN to WAN Logs, LAN to DMZ Logs, DMZ to WAN Logs, WAN to LAN Logs