Prestige 650 Series User’s Guide

 

Chart H-2 UPnP Logs

 

 

LOG MESSAGE

DESCRIPTION

 

 

UPnP pass through

UPnP packets can pass through the firewall.

Firewall

 

The attack logs may include the protocol (Protocol) of the packet (for example TCP or UDP) that triggered the log.

 

Chart H-3 Attack Logs

 

 

LOG MESSAGE

DESCRIPTION

 

 

attack (Protocol)

The firewall detected an attack. The log may also display the protocol

 

(for example TCP or UDP).

land Protocol)

The firewall detected a land attack. The log may also display the

 

protocol (for example TCP or UDP).

icmp echo ICMP

The firewall detected an ICMP echo attack. See the section on ICMP

(type:%d, code:%d)

messages for type and code details.

syn flood TCP

The firewall detected a TCP syn flood attack.

ports scan TCP

The firewall detected a TCP port scan attack.

teardrop (Protocol)

The firewall detected a teardrop attack.

illegal command TCP

The firewall detected a TCP SMTP illegal command attack.

NetBIOS TCP

The firewall detected a TCP NetBIOS attack.

ip spoofing - no

The firewall detected an IP spoofing attack while the Prestige did not

routing entry

have a default route. The log may also display the protocol (for

(Protocol)

example TCP or UDP).

 

vulnerability ICMP

The firewall detected an ICMP vulnerability attack; see the section on

(type:%d, code:%d)

ICMP messages for type and code details.

traceroute ICMP

The firewall detected an ICMP traceroute attack; see the section on

(type:%d, code:%d)

ICMP messages for type and code details.

Access logs may include the following information:

H-2

Log Descriptions