
Chapter 20 Logs
Table 101 System Maintenance Logs (continued)
LOG MESSAGE | DESCRIPTION |
Starting Connectivity | Starting Connectivity Monitor. |
Monitor |
|
Time initialized by Daytime | The router got the time and date from the Daytime server. |
Server |
|
Time initialized by Time | The router got the time and date from the time server. |
server |
|
Time initialized by NTP | The router got the time and date from the NTP server. |
server |
|
Connect to Daytime server | The router was not able to connect to the Daytime server. |
fail |
|
Connect to Time server fail | The router was not able to connect to the Time server. |
Connect to NTP server fail | The router was not able to connect to the NTP server. |
Too large ICMP packet has | The router dropped an ICMP packet that was too large. |
been dropped |
|
Configuration Change: PC = | The router is saving configuration changes. |
0x%x, Task ID = 0x%x |
|
Successful SSH login | Someone has logged on to the router’s SSH server. |
SSH login failed | Someone has failed to log on to the router’s SSH server. |
Successful HTTPS login | Someone has logged on to the router's web configurator |
| interface using HTTPS protocol. |
HTTPS login failed | Someone has failed to log on to the router's web configurator |
| interface using HTTPS protocol. |
Table 102 System Error Logs
LOG MESSAGE | DESCRIPTION |
%s exceeds the max. | This attempt to create a NAT session exceeds the maximum |
number of session per | number of NAT session table entries allowed to be created per |
host! | host. |
setNetBIOSFilter: calloc | The router failed to allocate memory for the NetBIOS filter |
error | settings. |
readNetBIOSFilter: calloc | The router failed to allocate memory for the NetBIOS filter |
error | settings. |
WAN connection is down. | A WAN connection is down. You cannot access the network |
| through this interface. |
Table 103 Access Control Logs
LOG MESSAGE | DESCRIPTION |
Firewall default policy: [TCP | Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access |
UDP IGMP ESP GRE OSPF] | matched the default policy and was blocked or forwarded |
<Packet Direction> | according to the default policy’s setting. |
Firewall rule [NOT] match:[TCP | Attempted TCP/UDP/IGMP/ESP/GRE/OSPF access |
UDP IGMP ESP GRE OSPF] | matched (or did not match) a configured firewall rule |
<Packet Direction>, <rule:%d> | (denoted by its number) and was blocked or forwarded |
| according to the rule. |
258 |
| |
| ||
|
|
|