Chapter 20 Logs

 

Table 110 PPP Logs (continued)

 

LOG MESSAGE

DESCRIPTION

 

ppp:IPCP

The PPP connection’s Internet Protocol Control Protocol stage is starting.

 

Starting

 

 

ppp:IPCP Opening

The PPP connection’s Internet Protocol Control Protocol stage is opening.

 

ppp:LCP Closing

The PPP connection’s Link Control Protocol stage is closing.

 

ppp:IPCP Closing

The PPP connection’s Internet Protocol Control Protocol stage is closing.

Table 111 UPnP Logs

LOG MESSAGE

DESCRIPTION

UPnP pass through Firewall

UPnP packets can pass through the firewall.

Table 112 Content Filtering Logs

LOG MESSAGE

DESCRIPTION

%s: block keyword

The content of a requested web page matched a user defined

 

keyword.

%s

The system forwarded web content.

For type and code details, see Table 116 on page 287.

Table 113 Attack Logs

LOG MESSAGE

DESCRIPTION

attack [ TCP UDP IGMP

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.

ESP GRE OSPF ]

 

attack ICMP (type:%d,

The firewall detected an ICMP attack.

code:%d)

 

land [ TCP UDP IGMP

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land

ESP GRE OSPF ]

attack.

land ICMP (type:%d,

The firewall detected an ICMP land attack.

code:%d)

 

ip spoofing - WAN [ TCP

The firewall detected an IP spoofing attack on the WAN port.

UDP IGMP ESP GRE

 

OSPF ]

 

ip spoofing - WAN ICMP

The firewall detected an ICMP IP spoofing attack on the WAN

(type:%d, code:%d)

port.

icmp echo : ICMP

The firewall detected an ICMP echo attack.

(type:%d, code:%d)

 

syn flood TCP

The firewall detected a TCP syn flood attack.

ports scan TCP

The firewall detected a TCP port scan attack.

teardrop TCP

The firewall detected a TCP teardrop attack.

teardrop UDP

The firewall detected an UDP teardrop attack.

teardrop ICMP (type:%d,

The firewall detected an ICMP teardrop attack.

code:%d)

 

illegal command TCP

The firewall detected a TCP illegal command attack.

 

285

P-660HN-F1 User’s Guide