ZyWALL 2 and ZyWALL 2WE

 

 

Chart Q-6 Access Logs

 

 

 

 

 

LOG MESSAGE

DESCRIPTION

 

 

 

 

 

 

Filter match DROP

ICMP access matched the listed filter rule and the ZyWALL dropped

 

 

<set %d/rule %d>

the packet to block access.

 

 

Filter match DROP

Access matched the listed filter rule and the ZyWALL dropped the

 

 

<set %d/rule %d>

packet to block access.

 

 

Filter match DROP

Access matched the listed filter rule (denied LAN IP) and the ZyWALL

 

 

<set %d/rule %d>

dropped the packet to block access.

 

 

Filter match FORWARD

TCP access matched the listed filter rule. Access was allowed and the

 

 

<set %d/rule %d>

router forwarded the packet.

 

 

Filter match FORWARD

UDP access matched the listed filter rule. Access was allowed and

 

 

<set %d/rule %d>

the router forwarded the packet.

 

 

Filter match FORWARD

ICMP access matched the listed filter rule. Access was allowed and

 

 

<set %d/rule %d>

the router forwarded the packet.

 

 

Filter match FORWARD

Access matched the listed filter rule. Access was allowed and the

 

 

<set %d/rule %d>

router forwarded the packet.

 

 

Filter match FORWARD

Access matched the listed filter rule (denied LAN IP). Access was

 

 

<set %d/rule %d>

allowed and the router forwarded the packet.

 

 

(set:%d)

With firewall messages, this is the number of the ACL policy set and

 

 

 

denotes the packet's direction (see Chart Q-7).

 

 

 

With filter messages, this is the number of the filter set.

 

 

 

 

 

 

(rule:%d)

With firewall messages, the firewall rule number denotes the number

 

 

 

of a firewall rule within an ACL policy set.

 

 

 

With filter messages, this is the number of an individual filter rule.

 

 

 

 

 

 

Router sent blocked

A message was sent to notify a user that the router blocked access to

 

 

web site message

a requested web site

 

 

 

 

 

 

Triangle route packet

The firewall allowed a triangle route session to pass through.

 

 

forwarded

 

 

 

Firewall sent TCP

The firewall detected a DoS attack and sent a TCP packet(s) in

 

 

packet in response to

response.

 

 

DoS attack

 

 

Log Descriptions

77