Chapter 26 Logs Screens

Table 174 Attack Logs (continued)

LOG MESSAGE

DESCRIPTION

Firewall sent TCP packet

The firewall sent TCP packet in response to a DoS attack

in response to DoS attack

 

TCP

 

ICMP Source Quench ICMP

The firewall detected an ICMP Source Quench attack.

ICMP Time Exceed ICMP

The firewall detected an ICMP Time Exceed attack.

ICMP Destination

The firewall detected an ICMP Destination Unreachable attack.

Unreachable ICMP

 

ping of death. ICMP

The firewall detected an ICMP ping of death attack.

smurf ICMP

The firewall detected an ICMP smurf attack.

IP address in FTP port

The IP address in an FTP port command is different from the

command is different from

client IP address. It may be a bounce attack.

the client IP address. It

 

maybe a bounce attack.

 

Fragment packet size is

The fragment packet size is smaller than the MTU size of output

smaller than the MTU size

interface.

of output interface.

 

Table 175 Remote Management Logs

LOG MESSAGE

DESCRIPTION

Remote Management: FTP denied

Attempted use of FTP service was blocked according to

 

remote management settings.

Remote Management: TELNET denied

Attempted use of TELNET service was blocked

 

according to remote management settings.

Remote Management: HTTP or UPnP

Attempted use of HTTP or UPnP service was blocked

denied

according to remote management settings.

Remote Management: WWW denied

Attempted use of WWW service was blocked according

 

to remote management settings.

Remote Management: HTTPS denied

Attempted use of HTTPS service was blocked

 

according to remote management settings.

Remote Management: SSH denied

Attempted use of SSH service was blocked according to

 

remote management settings.

Remote Management: ICMP Ping

Attempted use of ICMP service was blocked according

response denied

to remote management settings.

Remote Management: SNMP denied

Attempted use of SNMP service was blocked according

 

to remote management settings.

Remote Management: DNS denied

Attempted use of DNS service was blocked according

 

to remote management settings.

Table 176 IPSec Logs

LOG MESSAGE

DESCRIPTION

Discard

REPLAY packet

The router received and discarded a packet with an incorrect

 

 

sequence number.

Inbound

packet

The router received a packet that has been altered. A third party

authentication failed

may have altered or tampered with the packet.

500

 

ZyWALL 2WG User’s Guide