|
|
|
|
| ZyWALL 10~100 Series Internet Security Gateway | |
|
|
|
|
| Chart | |
|
|
|
|
|
|
|
|
| LOG MESSAGE |
| DESCRIPTION |
| |
|
|
|
|
|
|
|
|
| Firewall sent TCP | The firewall sent out TCP reset packets. |
| ||
|
| reset packets |
|
|
| |
|
| Packet without a NAT | The router blocked a packet that did not have a corresponding NAT |
| ||
|
| table entry blocked | table entry. |
| ||
|
| Out of order TCP | The router blocked a TCP handshake packet that came out of the |
| ||
|
| handshake packet | proper order |
| ||
|
| blocked |
|
|
|
|
|
| Drop unsupported/out- | The ZyWALL generates this log after it drops an ICMP packet due to |
| ||
|
| one of the following two reasons: |
| |||
|
|
|
| 1. The ZyWALL does not support the ICMP packet's protocol. |
| |
|
|
|
| 2. The ICMP packet is an echo reply for which there was no |
| |
|
|
|
| corresponding echo request. |
| |
|
|
|
|
|
|
|
|
| Router sent ICMP | The router sent an ICMP response packet. This packet automatically |
| ||
|
| response packet | bypasses the firewall. See the section on ICMP messages for type |
| ||
|
| (type:%d, code:%d) | and code details. |
| ||
|
|
|
| Chart | ||
|
|
|
|
|
| |
|
| ACL SET | DIRECTION |
| DESCRIPTION |
|
|
| NUMBER |
|
|
|
|
| 1 | LAN to WAN |
| ACL set 1 for packets traveling from the LAN to the WAN. |
| |
| 2 | WAN to LAN |
| ACL set 2 for packets traveling from the WAN to the LAN. |
| |
| 3 | DMZ to LAN |
| ACL set 3 for packets traveling from the DMZ to the LAN. |
| |
| 4 | DMZ to WAN |
| ACL set 4 for packets traveling from the DMZ to the WAN. |
| |
| 5 | WAN to DMZ |
| ACL set 5 for packets traveling from the WAN to the DMZ. |
| |
| 6 | LAN to DMZ |
| ACL set 6 for packets traveling from the LAN to the DMZ. |
| |
| 7 | LAN to |
| ACL set 7 for packets traveling from the LAN to the LAN or the |
| |
|
|
| LAN/ZyWALL |
| ZyWALL. |
|
| 8 | WAN to |
| ACL set 8 for packets traveling from the WAN to the WAN or the |
| |
|
|
| WAN/ZyWALL |
| ZyWALL. |
|
Log Descriptions |