Appendix A Log Descriptions

Table 256 ADP Logs

LOG MESSAGE

DESCRIPTION

from <zone> to <zone>

The ZyWALL detected an anomaly in traffic traveling

[type=<type>] <message>

between the specified zones.

, Action: <action>,

The <type> = {scan-detection(<attack>) flood-

Severity: <severity>

detection(<attack>) http-inspection(<attack>) tcp-

 

 

decoder(<attack>)}.

 

The <message> gives details about the attack, although the

 

message is dropped if the log is more than 128 characters.

 

The <action> is what the ZyWALL did with the packet.

 

The <severity> is the threat level (very low, low, medium,

 

high, or severe).

 

 

Enable ADP succeeded.

ADP was turned on.

Disable ADP succeeded.

ADP was turned off.

ADP rule <num> has been

The specified ADP rule has been deleted.

deleted.

 

ADP rule <num> has been

The ADP rule with the specified index number (first num)

moved to <num>.

was moved to the specified index number (second num).

New ADP rule has been

An ADP rule has been added to the end of the list.

appended.

 

ADP rule <num> has been

An ADP rule has been inserted. <num> is the number of the

inserted.

new rule.

ADP rule <num> has been

The ADP rule of the specified number has been changed.

modified.

 

ADP profile <name> has

The ADP rule with the specified name has been removed.

been deleted.

 

ADP profile <name> has

An ADP rule’s name has been changed from first <name> to

been changed to <name>.

the second <name>.

ADP profile <name> has

An ADP profile with the specified name has been added.

been created.

 

ADP profile <name> has

The ADP rule with the specified name has been changed.

been modified.

 

Packet payload length

The ZyWALL’s ADP feature detected a packet with a length

is over the maximum

over 16000 bytes.

system handle length

 

LAND attack packet.

The ZyWALL’s ADP feature detected traffic with the same IP

Source IP is the same

address set as both the source and the destination.

as Destination IP.

 

792

 

ZyWALL USG 50 User’s Guide