Chapter 18 Logs

 

Table 80 Content Filtering Logs (continued)

 

LOG MESSAGE

DESCRIPTION

 

%s: Proxy mode

The router detected proxy mode in the packet.

 

detected

 

 

 

%s

The content filter server responded that the web site is in the blocked

 

 

category list, but it did not return the category type.

 

%s:%s

The content filter server responded that the web site is in the blocked

 

 

category list, and returned the category type.

 

%s(cache hit)

The system detected that the web site is in the blocked list from the

 

 

local cache, but does not know the category type.

 

%s:%s(cache hit)

The system detected that the web site is in blocked list from the local

 

 

cache, and knows the category type.

 

%s: Trusted Web site

The web site is in a trusted domain.

 

%s

When the content filter is not on according to the time schedule or you

 

 

didn't select the "Block Matched Web Site” check box, the system

 

 

forwards the web content.

 

 

 

 

 

Waiting content filter

The external content filtering server did not respond within the timeout

 

server timeout

period.

 

DNS resolving failed

The ZyXEL Device cannot get the IP address of the external content

 

 

filtering via DNS query.

 

Creating socket failed

The ZyXEL Device cannot issue a query because TCP/IP socket

 

 

creation failed, port:port number.

 

Connecting to content

The connection to the external content filtering server failed.

 

filter server fail

 

 

 

License key is invalid

The external content filtering license key is invalid.

 

Table 81 Attack Logs

 

 

 

LOG MESSAGE

 

DESCRIPTION

 

attack [TCP UDP IGMP

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.

 

ESP GRE OSPF]

 

 

 

attack ICMP (type:%d,

 

The firewall detected an ICMP attack. For type and code details,

 

code:%d)

 

see Table 85 on page 184.

 

land [TCP UDP IGMP

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land

 

ESP GRE OSPF]

 

attack.

 

land ICMP (type:%d,

 

The firewall detected an ICMP land attack. For type and code

 

code:%d)

 

details, see Table 85 on page 184.

 

ip spoofing - WAN [TCP

The firewall detected an IP spoofing attack on the WAN port.

 

UDP IGMP ESP GRE

 

 

OSPF]

 

 

 

ip spoofing - WAN ICMP

 

The firewall detected an ICMP IP spoofing attack on the WAN

 

(type:%d, code:%d)

 

port. For type and code details, see Table 85 on page 184.

 

icmp echo: ICMP (type:%d,

The firewall detected an ICMP echo attack. For type and code

 

code:%d)

 

details, see Table 85 on page 184.

 

syn flood TCP

 

The firewall detected a TCP syn flood attack.

 

ports scan TCP

 

The firewall detected a TCP port scan attack.

 

teardrop TCP

 

The firewall detected a TCP teardrop attack.

 

181

ZyXEL NBG-334SH User’s Guide