HomeSafe User’s Guide

5.Firewall log

Firewall Log Message Format

SdcmdSyslogSend(SYSLOG_FIREWALL, SYSLOG_NOTICE, buf);

 

 

 

buf = IP[Src=xx.xx.xx.xx : spo=xxxx Dst=xx.xx.xx.xx : dpo=xxxx prot rule action]

 

Src: Source Address

 

 

 

 

 

spo: Source port (empty means no source port information)

 

 

 

Dst: Destination Address

 

 

 

 

dpo: Destination port (empty means no destination port information)

 

 

prot: Protocol (“TCP”,”UDP”,”ICMP”, ”IGMP”, ”GRE”, ”ESP”)

 

 

 

rule: <a,b> where a means "set" number; b means "rule" number.

 

 

Action: nothing(N) block (B) forward (F)

 

 

 

 

08-01-2000

11:48:41 Local1.Notice

192.168.10.10

RAS: FW 172.21.1.80

:137

-

>172.21.1.80

:137

UDPdefault permit:<2,0>B

 

 

 

08-01-2000

11:48:41 Local1.Notice

192.168.10.10

RAS: FW 192.168.77.88

:520

-

>192.168.77.88

:520

UDPdefault permit:<2,0>B

 

 

 

08-01-2000

11:48:39 Local1.Notice

192.168.10.10

RAS: FW 172.21.1.50

->172.21.1.50

IGMP<2>default permit:<2,0>B

 

 

 

 

08-01-2000

11:48:39 Local1.Notice

192.168.10.10

RAS: FW 172.21.1.25

->172.21.1.25

IGMP<2>default permit:<2,0>B

 

 

 

 

30.3.2 Call-Triggering Packet

Call-Triggering Packet displays information about the packet that triggered a dial-out call in an easy readable format. Equivalent information is available in menu 24.1 in hex format. An example is shown next.

 

IP Frame: ENET0-RECV Size:

44/

44 Time: 17:02:44.262

 

Frame Type:

 

 

 

IP Header:

 

 

 

IP Version

=

4

 

Header Length

=

20

 

Type of Service

=

0x00 (0)

 

Total Length

=

0x002C (44)

 

Identification

 

= 0x0002 (2)

 

Flags

=

0x00

 

Fragment Offset

=

0x00

 

Time to Live

=

0xFE (254)

 

Protocol

=

0x06 (TCP)

 

Header Checksum

=

0xFB20 (64288)

 

Source IP

=

0xC0A80101 (192.168.1.1)

 

Destination IP

=

0x00000000 (0.0.0.0)

 

TCP Header:

 

 

 

Source Port

=

0x0401 (1025)

 

Destination Port

=

0x000D (13)

 

Sequence Number

=

0x05B8D000 (95997952)

 

Ack Number

=

0x00000000 (0)

 

Header Length

=

24

 

Flags

=

0x02 (....S.)

 

Window Size

=

0x2000 (8192)

 

Checksum

=

0xE06A (57450)

 

Urgent Ptr

=

0x0000 (0)

 

Options

=

 

 

0000: 02 04 02 00

 

 

 

RAW DATA:

 

 

 

0000: 45 00 00 2C 00 02 00

00-FE 06 FB 20 C0 A8 01 01 E

 

0010: 00 00 00 00 04 01 00

0D-05 B8 D0 00 00 00 00 00

 

0020: 60 02 20 00 E0 6A 00

00-02 04 02 00

 

Press any key to continue...

 

 

 

 

 

Figure 30-7 Call-Triggering Packet Example

30.4 Diagnostic

 

 

The diagnostic facility allows you to test the different aspects of your HomeSafe to determine if it is working properly. Menu 24.4 allows you to choose among various types of diagnostic tests to evaluate your system, as shown in the following figure.

Follow the procedure next to get to Diagnostic:

Step 1. From the main menu, type 24 to open Menu 24 – System Maintenance.

Step 2. From this menu, type 4 to open Menu 24.4 System Maintenance Diagnostic.

30-6

System Information and Diagnosis

Page 291
Image 291
ZyXEL Communications HS100/HS100W manual Diagnostic, Call-Triggering Packet