ZyWALL 10/50 Internet Security Gateway

Proto = LCP / ATCP / BACP / BCP / CBCP / CCP / CHAP/ PAP / IPCP /

IPXCP

Jul 19 11:42:44 192.168.102.2 ZyXEL: ppp:LCP Closing

Jul 19 11:42:49 192.168.102.2 ZyXEL: ppp:IPCP Closing

Jul 19 11:42:54 192.168.102.2 ZyXEL: ppp:CCP Closing

5.Firewall log

Firewall Log Message Format

sdcmdSyslogSend(SYSLOG_FIREWALL, SYSLOG_NOTICE, buf);

buf = IP[Src=xx.xx.xx.xx : spo=xxxx Dst=xx.xx.xx.xx : dpo=xxxx prot rule action]

Src: Source Address

spo: Source port (empty means no source port information)

Dst: Destination Address

dpo: Destination port (empty means no destination port information)

prot: Protocol (“TCP”,”UDP”,”ICMP”, ”IGMP”, ”GRE”, ”ESP”)

rule: <a,b> where a means "set" number; b means "rule" number.

action: nothing(N) block (B) forward (F)

08-01-2000 11:48:41 Local1.Notice 192.168.10.10 RAS: FW 172.21.1.80 :137 - >172.21.1.80 :137 UDPdefault permit:<2,0>B

08-01-200011:48:41

Local1.Notice

192.168.10.10

RAS: FW 192.168.77.88 :520 ->192.168.77.88 :520

UDPdefault permit:<2,0>B

 

 

 

 

 

08-01-2000

11:48:39 Local1.Notice

192.168.10.10

RAS: FW 172.21.1.50

->172.21.1.50

IGMP<2>default permit:<2,0>B

 

 

 

 

 

08-01-2000

11:48:39 Local1.Notice

192.168.10.10

RAS: FW 172.21.1.25

->172.21.1.25

IGMP<2>default permit:<2,0>B

 

 

 

 

 

20.3.3 Call-Triggering Packet

Call-Triggering Packet displays information about the packet that triggered a dial-out call in an easy readable format. Equivalent information is available in menu 24.1 in hex format. An example is shown next.

20-10

System Information & Diagnosis