P-2302R Series User’s Guide

Table 57 Access Control Logs (continued)

LOG MESSAGE

DESCRIPTION

 

 

Exceed maximum sessions per host (%d).

The device blocked a session because the host's

 

connections exceeded the maximum sessions per host.

Firewall allowed a packet that matched a

A packet from the WAN (TCP or UDP) matched a cone

NAT session: [ TCP UDP ]

NAT session and the device forwarded it to the LAN.

 

 

Table 58 TCP Reset Logs

LOG MESSAGE

DESCRIPTION

 

 

Under SYN flood attack,

The router sent a TCP reset packet when a host was under a SYN

sent TCP RST

flood attack (the TCP incomplete count is per destination host.)

Exceed TCP MAX

The router sent a TCP reset packet when the number of TCP

incomplete, sent TCP RST

incomplete connections exceeded the user configured threshold.

 

(the TCP incomplete count is per destination host.)

Peer TCP state out of

The router sent a TCP reset packet when a TCP connection state

order, sent TCP RST

was out of order.Note: The firewall refers to RFC793 Figure 6 to

 

check the TCP state.

Firewall session time

The router sent a TCP reset packet when a dynamic firewall

out, sent TCP RST

session timed out.

 

The default timeout values are as follows:

 

ICMP idle timeout: 3 minutes

 

UDP idle timeout: 3 minutes

 

TCP connection (three way handshaking) timeout: 270 seconds

 

TCP FIN-wait timeout: 2 MSL (Maximum Segment Lifetime set in

 

the TCP header).

 

TCP idle (established) timeout (s): 150 minutes

 

TCP reset timeout: 10 seconds

 

 

Exceed MAX incomplete,

The router sent a TCP reset packet when the number of

sent TCP RST

incomplete connections (TCP and UDP) exceeded the user-

 

configured threshold. (Incomplete count is for all TCP and UDP

 

connections through the firewall.)Note: When the number of

 

incomplete connections (TCP + UDP) > “Maximum Incomplete

 

High”, the router sends TCP RST packets for TCP connections

 

and destroys TOS (firewall dynamic sessions) until incomplete

 

connections < “Maximum Incomplete Low”.

Access block, sent TCP

The router sends a TCP RST packet and generates this log if you

RST

turn on the firewall TCP reset mechanism (via CI command: sys

 

firewall tcprst).

Table 59 Packet Filter Logs

LOG MESSAGE

DESCRIPTION

 

 

[ TCP UDP ICMP IGMP

Attempted access matched a configured filter rule (denoted by

Generic

] packet filter

its set and rule number) and was blocked or forwarded

matched

(set: %d, rule: %d)

according to the rule.

187

Chapter 18 Logs