ZyWALL 10/50 Internet Security Gateway
Proto = LCP / ATCP / BACP / BCP / CBCP / CCP / CHAP/ PAP / IPCP /
IPXCP
Jul 19 11:42:44 192.168.102.2 ZyXEL: ppp:LCP Closing
Jul 19 11:42:49 192.168.102.2 ZyXEL: ppp:IPCP Closing
Jul 19 11:42:54 192.168.102.2 ZyXEL: ppp:CCP Closing
5.Firewall log
Firewall Log Message Format
sdcmdSyslogSend(SYSLOG_FIREWALL, SYSLOG_NOTICE, buf);
buf = IP[Src=xx.xx.xx.xx : spo=xxxx Dst=xx.xx.xx.xx : dpo=xxxx prot rule action]
Src: Source Address
spo: Source port (empty means no source port information)
Dst: Destination Address
dpo: Destination port (empty means no destination port information)
prot: Protocol (“TCP”,”UDP”,”ICMP”, ”IGMP”, ”GRE”, ”ESP”)
rule: <a,b> where a means "set" number; b means "rule" number.
action: nothing(N) block (B) forward (F)
Local1.Notice | 192.168.10.10 | RAS: FW 192.168.77.88 :520 | ||||
UDPdefault permit:<2,0>B |
|
|
|
|
| |
11:48:39 Local1.Notice | 192.168.10.10 | RAS: FW 172.21.1.50 | ||||
IGMP<2>default permit:<2,0>B |
|
|
|
|
| |
11:48:39 Local1.Notice | 192.168.10.10 | RAS: FW 172.21.1.25 | ||||
IGMP<2>default permit:<2,0>B |
|
|
|
|
|
20.3.3 Call-Triggering Packet
System Information & Diagnosis |