|
|
| Chapter 18 Logs |
| Table 80 Content Filtering Logs (continued) | ||
| LOG MESSAGE | DESCRIPTION | |
| %s: Proxy mode | The router detected proxy mode in the packet. | |
| detected |
|
|
| %s | The content filter server responded that the web site is in the blocked | |
|
| category list, but it did not return the category type. | |
| %s:%s | The content filter server responded that the web site is in the blocked | |
|
| category list, and returned the category type. | |
| %s(cache hit) | The system detected that the web site is in the blocked list from the | |
|
| local cache, but does not know the category type. | |
| %s:%s(cache hit) | The system detected that the web site is in blocked list from the local | |
|
| cache, and knows the category type. | |
| %s: Trusted Web site | The web site is in a trusted domain. | |
| %s | When the content filter is not on according to the time schedule or you | |
|
| didn't select the "Block Matched Web Site” check box, the system | |
|
| forwards the web content. | |
|
|
|
|
| Waiting content filter | The external content filtering server did not respond within the timeout | |
| server timeout | period. | |
| DNS resolving failed | The ZyXEL Device cannot get the IP address of the external content | |
|
| filtering via DNS query. | |
| Creating socket failed | The ZyXEL Device cannot issue a query because TCP/IP socket | |
|
| creation failed, port:port number. | |
| Connecting to content | The connection to the external content filtering server failed. | |
| filter server fail |
|
|
| License key is invalid | The external content filtering license key is invalid. | |
| Table 81 Attack Logs |
|
|
| LOG MESSAGE |
| DESCRIPTION |
| attack [TCP UDP IGMP | The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack. | |
| ESP GRE OSPF] |
|
|
| attack ICMP (type:%d, |
| The firewall detected an ICMP attack. For type and code details, |
| code:%d) |
| see Table 85 on page 184. |
| land [TCP UDP IGMP | The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land | |
| ESP GRE OSPF] |
| attack. |
| land ICMP (type:%d, |
| The firewall detected an ICMP land attack. For type and code |
| code:%d) |
| details, see Table 85 on page 184. |
| ip spoofing - WAN [TCP | The firewall detected an IP spoofing attack on the WAN port. | |
| UDP IGMP ESP GRE |
| |
| OSPF] |
|
|
| ip spoofing - WAN ICMP |
| The firewall detected an ICMP IP spoofing attack on the WAN |
| (type:%d, code:%d) |
| port. For type and code details, see Table 85 on page 184. |
| icmp echo: ICMP (type:%d, | The firewall detected an ICMP echo attack. For type and code | |
| code:%d) |
| details, see Table 85 on page 184. |
| syn flood TCP |
| The firewall detected a TCP syn flood attack. |
| ports scan TCP |
| The firewall detected a TCP port scan attack. |
| teardrop TCP |
| The firewall detected a TCP teardrop attack. |
| 181 |
ZyXEL | |
|
|