Chapter 25 Logs Screens

Table 149 Content Filtering Logs

LOG MESSAGE

DESCRIPTION

%s: Keyword blocking

The content of a requested web page matched a user defined

 

keyword.

%s: Not in trusted web

The web site is not in a trusted domain, and the router blocks all traffic

list

except trusted domain sites.

%s: Forbidden Web site

The web site is in the forbidden web site list.

%s: Contains ActiveX

The web site contains ActiveX.

%s: Contains Java

The web site contains a Java applet.

applet

 

%s: Contains cookie

The web site contains a cookie.

%s: Proxy mode

The router detected proxy mode in the packet.

detected

 

%s

The content filter server responded that the web site is in the blocked

 

category list, but it did not return the category type.

%s: %s

The content filter server responded that the web site is in the blocked

 

category list, and returned the category type.

%s(cache hit)

The system detected that the web site is in the blocked list from the

 

local cache, but does not know the category type.

%s :%s(cache hit)

The system detected that the web site is in blocked list from the local

 

cache, and knows the category type.

%s: Trusted Web site

The web site is in a trusted domain.

%s

When the content filter is not on according to the time schedule or you

 

didn't select the "Block Matched Web Site” check box, the system

 

forwards the web content.

 

 

Waiting content filter

The external content filtering server did not respond within the timeout

server timeout

period.

DNS resolving failed

The ZyWALL cannot get the IP address of the external content filtering

 

via DNS query.

Creating socket failed

The ZyWALL cannot issue a query because TCP/IP socket creation

 

failed, port:port number.

Connecting to content

The connection to the external content filtering server failed.

filter server fail

 

License key is invalid

The external content filtering license key is invalid.

For type and code details, see Table 157 on page 443.

Table 150 Attack Logs

LOG MESSAGE

DESCRIPTION

attack [ TCP UDP IGMP

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.

ESP GRE OSPF ]

 

attack ICMP (type:%d,

The firewall detected an ICMP attack.

code:%d)

 

land [ TCP UDP IGMP

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land

ESP GRE OSPF ]

attack.

land ICMP (type:%d,

The firewall detected an ICMP land attack.

code:%d)

 

 

435

ZyWALL 2 Plus User’s Guide