|
| ZyWALL 2 and ZyWALL 2WE | |
|
| Chart | |
|
|
|
|
| LOG MESSAGE | DESCRIPTION |
|
|
|
|
|
| Filter match DROP | ICMP access matched the listed filter rule and the ZyWALL dropped |
|
| <set %d/rule %d> | the packet to block access. |
|
| Filter match DROP | Access matched the listed filter rule and the ZyWALL dropped the |
|
| <set %d/rule %d> | packet to block access. |
|
| Filter match DROP | Access matched the listed filter rule (denied LAN IP) and the ZyWALL |
|
| <set %d/rule %d> | dropped the packet to block access. |
|
| Filter match FORWARD | TCP access matched the listed filter rule. Access was allowed and the |
|
| <set %d/rule %d> | router forwarded the packet. |
|
| Filter match FORWARD | UDP access matched the listed filter rule. Access was allowed and |
|
| <set %d/rule %d> | the router forwarded the packet. |
|
| Filter match FORWARD | ICMP access matched the listed filter rule. Access was allowed and |
|
| <set %d/rule %d> | the router forwarded the packet. |
|
| Filter match FORWARD | Access matched the listed filter rule. Access was allowed and the |
|
| <set %d/rule %d> | router forwarded the packet. |
|
| Filter match FORWARD | Access matched the listed filter rule (denied LAN IP). Access was |
|
| <set %d/rule %d> | allowed and the router forwarded the packet. |
|
| (set:%d) | With firewall messages, this is the number of the ACL policy set and |
|
|
| denotes the packet's direction (see Chart |
|
|
| With filter messages, this is the number of the filter set. |
|
|
|
|
|
| (rule:%d) | With firewall messages, the firewall rule number denotes the number |
|
|
| of a firewall rule within an ACL policy set. |
|
|
| With filter messages, this is the number of an individual filter rule. |
|
|
|
|
|
| Router sent blocked | A message was sent to notify a user that the router blocked access to |
|
| web site message | a requested web site |
|
|
|
|
|
| Triangle route packet | The firewall allowed a triangle route session to pass through. |
|
| forwarded |
|
|
| Firewall sent TCP | The firewall detected a DoS attack and sent a TCP packet(s) in |
|
| packet in response to | response. |
|
| DoS attack |
|
|
Log Descriptions | 77 |