
Chapter 20 Logs
Table 113 Attack Logs (continued)
LOG MESSAGE |
| DESCRIPTION |
NetBIOS TCP |
| The firewall detected a TCP NetBIOS attack. |
ip spoofing - | no routing | The firewall classified a packet with no source routing entry as an |
entry [ TCP | UDP IGMP | IP spoofing attack. |
ESP GRE | OSPF ] |
|
ip spoofing - | no routing | The firewall classified an ICMP packet with no source routing |
entry ICMP (type:%d, | entry as an IP spoofing attack. | |
code:%d) |
|
|
vulnerability | ICMP | The firewall detected an ICMP vulnerability attack. |
(type:%d, code:%d) |
| |
traceroute ICMP (type:%d, | The firewall detected an ICMP traceroute attack. | |
code:%d) |
|
|
Table 114 802.1X Logs
LOG MESSAGE | DESCRIPTION |
RADIUS accepts user. | A user was authenticated by the RADIUS Server. |
RADIUS rejects user. Pls check | A user was not authenticated by the RADIUS Server. |
RADIUS Server. | Please check the RADIUS Server. |
User logout because of session | The router logged out a user whose session expired. |
timeout expired. |
|
User logout because of user | The router logged out a user who ended the session. |
deassociation. |
|
User logout because of no | The router logged out a user from which there was no |
authentication response from | authentication response. |
user. |
|
User logout because of idle | The router logged out a user whose idle timeout period |
timeout expired. | expired. |
User logout because of user | A user logged out. |
request. |
|
No response from RADIUS. Pls | There is no response message from the RADIUS server, |
check RADIUS Server. | please check the RADIUS server. |
Use RADIUS to authenticate user. | The RADIUS server is operating as the authentication |
| server. |
No Server to authenticate user. | There is no authentication server to authenticate a user. |
Table 115 ACL Setting Notes
PACKET DIRECTION | DIRECTION | DESCRIPTION |
(L to W) | LAN to WAN | ACL set for packets traveling from the LAN to the WAN. |
|
|
|
(W to L) | WAN to LAN | ACL set for packets traveling from the WAN to the LAN. |
|
|
|
(L to L/ZyXEL Device) | LAN to LAN/ | ACL set for packets traveling from the LAN to the LAN or |
| ZyXEL Device | the ZyXEL Device. |
|
|
|
(W to W/ZyXEL | WAN to WAN/ | ACL set for packets traveling from the WAN to the WAN |
Device) | ZyXEL Device | or the ZyXEL Device. |
|
|
|
286 |
| |
| ||
|
|
|