Chapter 20 Logs
Table 84 Attack Logs (continued)
LOG MESSAGE | DESCRIPTION |
NetBIOS TCP | The firewall detected a TCP NetBIOS attack. |
ip spoofing - no routing | The firewall classified a packet with no source routing |
entry [ TCP UDP IGMP | entry as an IP spoofing attack. |
ESP GRE OSPF ] |
|
ip spoofing - no routing | The firewall classified an ICMP packet with no source |
entry ICMP (type:%d, | routing entry as an IP spoofing attack. |
code:%d) |
|
vulnerability ICMP | The firewall detected an ICMP vulnerability attack. |
(type:%d, code:%d) |
|
traceroute ICMP (type:%d, | The firewall detected an ICMP traceroute attack. |
code:%d) |
|
Table 85 | 802.1X Logs |
| ||
LOG MESSAGE |
| DESCRIPTION | ||
RADIUS accepts user. | A user was authenticated by the RADIUS Server. | |||
RADIUS rejects user. Pls check | A user was not authenticated by the RADIUS | |||
RADIUS Server. |
| Server. Please check the RADIUS Server. | ||
User logout because of session | The router logged out a user whose session | |||
timeout expired. |
| expired. | ||
User logout because of user | The router logged out a user who ended the | |||
deassociation. |
| session. | ||
User logout because of no | The router logged out a user from which there | |||
authentication response from | was no authentication response. | |||
user. |
|
|
| |
User logout because of idle | The router logged out a user whose idle timeout | |||
timeout expired. |
| period expired. | ||
User logout because of user | A user logged out. | |||
request. |
|
|
| |
No response from RADIUS. Pls | There is no response message from the RADIUS | |||
check RADIUS Server. | server, please check the RADIUS server. | |||
Use RADIUS to authenticate user. | The RADIUS server is operating as the | |||
|
|
| authentication server. | |
|
|
| ||
No Server to authenticate user. | There is no authentication server to authenticate | |||
|
|
| a user. | |
|
|
| ||
Table 86 ACL Setting Notes |
| |||
PACKET |
| DIRECTION | DESCRIPTION | |
DIRECTION | ||||
|
| |||
(L to W) |
| LAN to WAN | ACL set for packets traveling from the LAN to the | |
|
|
| WAN. | |
|
|
|
| |
(W to L) |
| WAN to LAN | ACL set for packets traveling from the WAN to the | |
|
|
| LAN. | |
|
|
|
|
216 |
| |
| ||
|
|
|