Chapter 18 The Logs Screens
User’s Guide
206
Time initialized by Time
server The device got the time and date from the time
server.
Time initialized by NTP
server The device got the time and date from the NTP
server.
Connect to Daytime server
fail The device was not able to connect to the Daytime
server.
Connect to Time server fail The device was not able to connect to the Time
server.
Connect to NTP server fail The device was not able to connect to the NTP server.
Too large ICMP packet has
been dropped The device dropped an ICMP packet that was too
large.
Configuration Change: PC =
0x%x, Task ID = 0x%x The device is saving configuration changes.
Table 81 Access Control LogsLOG MESSAGE DESCRIPTION
Firewall default policy: [ TCP |
UDP | IGMP | ESP | GRE | OSPF ]
<Packet Direction>
Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access
matched the default policy and was blocked or
forwarded according to the default policy’s
setting.
Firewall rule [NOT] match:[ TCP
| UDP | IGMP | ESP | GRE | OSPF
] <Packet Direction>, <rule:%d>
Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access
matched (or did not match) a configured firewall
rule (denoted by its number) and was blocked or
forwarded according to the rule.
Triangle route packet forwarded:
[ TCP | UDP | IGMP | ESP | GRE |
OSPF ]
The firewall allowed a triangle route session to
pass through.
Packet without a NAT table entry
blocked: [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
The router blocked a packet that didn't have a
corresponding NAT table entry.
Router sent blocked web site
message: TCP The router sent a message to notify a user that
the router blocked access to a web site that the
user requested.
Exceed maximum sessions per host
(%d). The device blocked a session because the host's
connections exceeded the maximum sessions per
host.
Firewall allowed a packet that
matched a NAT session: [ TCP |
UDP ]
A packet from the WAN (TCP or UDP) matched a
cone NAT session and the device forwarded it to
the LAN.
Table 80 System Maintenance Logs (continued)LOG MESSAGE DESCRIPTION