ZyWALL 5/35/70 Series User’s Guide
Table 287 Wireless Logs
LOG MESSAGE | DESCRIPTION |
|
|
WLAN MAC Filter Fail | The MAC filter blocked a wireless station from connecting to the |
| device. |
WLAN MAC Filter Success | The MAC filter allowed a wireless station to connect to the device. |
WLAN STA Association | A wireless station associated with the device. |
WLAN STA Association List | The maximum number of associated wireless clients has been |
Full | reached. |
WLAN STA Association Again | The SSID and time of association were updated for an wireless |
| station that was already associated. |
LOG MESSAGE | DESCRIPTION |
|
|
Discard REPLAY packet | The router received and discarded a packet with an incorrect |
| sequence number. |
Inbound packet | The router received a packet that has been altered. A third party may |
authentication failed | have altered or tampered with the packet. |
Receive IPSec packet, | The router dropped an inbound packet for which SPI could not find a |
but no corresponding | corresponding phase 2 SA. |
tunnel exists |
|
Rule <%d> idle time out, | The router dropped a connection that had outbound traffic and no |
disconnect | inbound traffic for a certain time period. You can use the "ipsec timer |
| chk_conn" CI command to set the time period. The default value is 2 |
| minutes. |
WAN IP changed to <IP> | The router dropped all connections with the “MyIP” configured as |
| “0.0.0.0” when the WAN IP address changed. |
Inbound packet | Please check the algorithm configuration. |
decryption failed |
|
Cannot find outbound SA | A packet matches a rule, but there is no phase 2 SA for outbound |
for rule <%d> | traffic. |
Rule [%s] sends an echo | The device sent a ping packet to check the specified VPN tunnel's |
request to peer | connectivity. |
Rule [%s] receives an | The device received a ping response when checking the specified |
echo reply from peer | VPN tunnel's connectivity. |
Appendix S Log Descriptions | 782 |