Chapter 21 Logs

 

Table 95 TCP Reset Logs (continued)

 

LOG MESSAGE

DESCRIPTION

 

Firewall session time

The router sent a TCP reset packet when a dynamic

 

out, sent TCP RST

firewall session timed out.

 

 

The default timeout values are as follows:

 

 

ICMP idle timeout: 3 minutes

 

 

UDP idle timeout: 3 minutes

 

 

TCP connection (three way handshaking) timeout: 270

 

 

seconds

 

 

TCP FIN-wait timeout: 2 MSL (Maximum Segment

 

 

Lifetime set in the TCP header).

 

 

TCP idle (established) timeout (s): 150 minutes

 

 

TCP reset timeout: 10 seconds

 

 

 

 

 

 

Exceed MAX incomplete,

The router sent a TCP reset packet when the number of

 

sent TCP RST

incomplete connections (TCP and UDP) exceeded the

 

 

user-configured threshold. (Incomplete count is for all

 

 

TCP and UDP connections through the firewall.)Note:

 

 

When the number of incomplete connections (TCP + UDP)

 

 

> “Maximum Incomplete High”, the router sends TCP RST

 

 

packets for TCP connections and destroys TOS (firewall

 

 

dynamic sessions) until incomplete connections <

 

 

“Maximum Incomplete Low”.

 

 

 

 

 

 

Access block, sent TCP

The router sends a TCP RST packet and generates this log

 

RST

if you turn on the firewall TCP reset mechanism (via CI

 

 

command: "sys firewall tcprst").

 

 

 

 

 

 

Table 96 Packet Filter Logs

 

 

 

 

LOG MESSAGE

 

DESCRIPTION

 

[TCP UDP ICMP IGMP

 

Attempted access matched a configured filter rule

 

Generic] packet filter

 

(denoted by its set and rule number) and was blocked

 

matched (set:%d, rule:%d)

 

or forwarded according to the rule.

 

Table 97 ICMP Logs

 

 

 

 

LOG MESSAGE

 

 

DESCRIPTION

 

Firewall default policy: ICMP

ICMP access matched the default policy and was

 

<Packet Direction>, <type:%d>,

blocked or forwarded according to the user's

 

<code:%d>

 

 

setting. For type and code details, see Table 108

 

 

 

 

on page 286.

 

 

 

 

Firewall rule [NOT] match: ICMP

ICMP access matched (or didn’t match) a firewall

 

<Packet Direction>, <rule:%d>,

rule (denoted by its number) and was blocked or

 

<type:%d>, <code:%d>

 

 

forwarded according to the rule. For type and

 

 

 

 

code details, see Table 108 on page 286.

 

 

 

 

 

NBG-460N User’s Guide

277

Page 277
Image 277
ZyXEL Communications wireless n gigbit router zyxel manual 277, Packet Filter Logs