Chapter 20 Logs

Table 101 System Maintenance Logs (continued)

LOG MESSAGE

DESCRIPTION

Starting Connectivity

Starting Connectivity Monitor.

Monitor

 

Time initialized by Daytime

The router got the time and date from the Daytime server.

Server

 

Time initialized by Time

The router got the time and date from the time server.

server

 

Time initialized by NTP

The router got the time and date from the NTP server.

server

 

Connect to Daytime server

The router was not able to connect to the Daytime server.

fail

 

Connect to Time server fail

The router was not able to connect to the Time server.

Connect to NTP server fail

The router was not able to connect to the NTP server.

Too large ICMP packet has

The router dropped an ICMP packet that was too large.

been dropped

 

Configuration Change: PC =

The router is saving configuration changes.

0x%x, Task ID = 0x%x

 

Successful SSH login

Someone has logged on to the router’s SSH server.

SSH login failed

Someone has failed to log on to the router’s SSH server.

Successful HTTPS login

Someone has logged on to the router's web configurator

 

interface using HTTPS protocol.

HTTPS login failed

Someone has failed to log on to the router's web configurator

 

interface using HTTPS protocol.

Table 102 System Error Logs

LOG MESSAGE

DESCRIPTION

%s exceeds the max.

This attempt to create a NAT session exceeds the maximum

number of session per

number of NAT session table entries allowed to be created per

host!

host.

setNetBIOSFilter: calloc

The router failed to allocate memory for the NetBIOS filter

error

settings.

readNetBIOSFilter: calloc

The router failed to allocate memory for the NetBIOS filter

error

settings.

WAN connection is down.

A WAN connection is down. You cannot access the network

 

through this interface.

Table 103 Access Control Logs

LOG MESSAGE

DESCRIPTION

Firewall default policy: [TCP

Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access

UDP IGMP ESP GRE OSPF]

matched the default policy and was blocked or forwarded

<Packet Direction>

according to the default policy’s setting.

Firewall rule [NOT] match:[TCP

Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access

UDP IGMP ESP GRE OSPF]

matched (or did not match) a configured firewall rule

<Packet Direction>, <rule:%d>

(denoted by its number) and was blocked or forwarded

 

according to the rule.

258

 

P-660HW-Tx v3 User’s Guide