Chapter 18 Logs

 

Table 74 TCP Reset Logs (continued)

 

 

LOG MESSAGE

DESCRIPTION

 

Firewall session time

The router sent a TCP reset packet when a dynamic firewall

 

out, sent TCP RST

session timed out.

 

 

The default timeout values are as follows:

 

 

ICMP idle timeout: 3 minutes

 

 

UDP idle timeout: 3 minutes

 

 

TCP connection (three way handshaking) timeout: 270 seconds

 

 

TCP FIN-wait timeout: 2 MSL (Maximum Segment Lifetime set in

 

 

the TCP header).

 

 

TCP idle (established) timeout (s): 150 minutes

 

 

TCP reset timeout: 10 seconds

 

 

 

 

 

 

Exceed MAX incomplete,

The router sent a TCP reset packet when the number of

 

sent TCP RST

incomplete connections (TCP and UDP) exceeded the user-

 

 

configured threshold. (Incomplete count is for all TCP and UDP

 

 

connections through the firewall.)Note: When the number of

 

 

incomplete connections (TCP + UDP) > “Maximum Incomplete

 

 

High”, the router sends TCP RST packets for TCP connections

 

 

and destroys TOS (firewall dynamic sessions) until incomplete

 

 

connections < “Maximum Incomplete Low”.

 

 

 

 

 

 

Access block, sent TCP

The router sends a TCP RST packet and generates this log if you

 

RST

turn on the firewall TCP reset mechanism (via CI command: "sys

 

 

firewall tcprst").

 

Table 75 Packet Filter Logs

 

 

 

 

LOG MESSAGE

 

DESCRIPTION

 

[TCP UDP ICMP IGMP

 

Attempted access matched a configured filter rule (denoted

 

Generic] packet filter

 

by its set and rule number) and was blocked or forwarded

 

matched (set:%d, rule:%d)

 

according to the rule.

 

Table 76 ICMP Logs

 

 

 

 

LOG MESSAGE

 

 

DESCRIPTION

 

Firewall default policy: ICMP

ICMP access matched the default policy and was

 

<Packet Direction>, <type:%d>,

blocked or forwarded according to the user's setting. For

 

<code:%d>

 

 

type and code details, see Table 85 on page 184.

 

Firewall rule [NOT] match: ICMP

ICMP access matched (or didn’t match) a firewall rule

 

<Packet Direction>, <rule:%d>,

(denoted by its number) and was blocked or forwarded

 

<type:%d>, <code:%d>

 

 

according to the rule. For type and code details, see

 

 

 

 

Table 85 on page 184.

 

Triangle route packet forwarded:

The firewall allowed a triangle route session to pass

 

ICMP

 

 

through.

 

Packet without a NAT table entry

The router blocked a packet that didn’t have a

 

blocked: ICMP

 

 

corresponding NAT table entry.

 

Unsupported/out-of-order ICMP:

The firewall does not support this kind of ICMP packets

 

ICMP

 

 

or the ICMP packets are out of order.

 

Router reply ICMP packet: ICMP

The router sent an ICMP reply packet to the sender.

 

179

ZyXEL NBG-334SH User’s Guide