ZyWALL 10~100 Series Internet Security Gateway

 

Chart 13-5 Attack Logs

 

 

LOG MESSAGE

DESCRIPTION

 

 

syn flood TCP

The firewall detected a TCP syn flood attack.

ports scan TCP

The firewall detected a TCP port scan attack.

teardrop TCP

The firewall detected a TCP teardrop attack.

teardrop UDP

The firewall detected an UDP teardrop attack.

teardrop ICMP

The firewall detected an ICMP teardrop attack; see the section on

(type:%d, code:%d)

ICMP messages for type and code details.

illegal command TCP

The firewall detected a TCP illegal command attack.

NetBIOS TCP

The firewall detected a TCP NetBIOS attack.

ip spoofing - no

The firewall detected a TCP IP spoofing attack while the ZyWALL did

routing entry TCP

not have a default route.

ip spoofing - no

The firewall detected an UDP IP spoofing attack while the ZyWALL did

routing entry UDP

not have a default route.

ip spoofing - no

The firewall detected an IGMP IP spoofing attack while the ZyWALL

routing entry IGMP

did not have a default route.

ip spoofing - no

The firewall detected an ESP IP spoofing attack while the ZyWALL did

routing entry ESP

not have a default route.

ip spoofing - no

The firewall detected a GRE IP spoofing attack while the ZyWALL did

routing entry GRE

not have a default route.

ip spoofing - no

The firewall detected an OSPF IP spoofing attack while the ZyWALL

routing entry OSPF

did not have a default route.

ip spoofing - no

The firewall detected an ICMP IP spoofing attack while the ZyWALL

routing entry ICMP

did not have a default route; see the section on ICMP messages for

(type:%d, code:%d)

type and code details.

vulnerability ICMP

The firewall detected an ICMP vulnerability attack; see the section on

(type:%d, code:%d)

ICMP messages for type and code details.

traceroute ICMP

The firewall detected an ICMP traceroute attack; see the section on

(type:%d, code:%d)

ICMP messages for type and code details.

13-4

Log Descriptions