Chapter 21 Logs

Table 102 Attack Logs

LOG MESSAGE

DESCRIPTION

attack [TCP UDP IGMP

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF

ESP GRE OSPF]

attack.

attack ICMP (type:%d,

The firewall detected an ICMP attack. For type and code

code:%d)

details, see Table 108 on page 286.

land [TCP UDP IGMP

The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF

ESP GRE OSPF]

land attack.

land ICMP (type:%d,

The firewall detected an ICMP land attack. For type and

code:%d)

code details, see Table 108 on page 286.

ip spoofing - WAN [TCP

The firewall detected an IP spoofing attack on the WAN

UDP IGMP ESP GRE

port.

OSPF]

 

ip spoofing - WAN ICMP

The firewall detected an ICMP IP spoofing attack on the

(type:%d, code:%d)

WAN port. For type and code details, see Table 108 on

 

page 286.

 

 

icmp echo: ICMP (type:%d,

The firewall detected an ICMP echo attack. For type and

code:%d)

code details, see Table 108 on page 286.

syn flood TCP

The firewall detected a TCP syn flood attack.

ports scan TCP

The firewall detected a TCP port scan attack.

teardrop TCP

The firewall detected a TCP teardrop attack.

teardrop UDP

The firewall detected an UDP teardrop attack.

teardrop ICMP (type:%d,

The firewall detected an ICMP teardrop attack. For type

code:%d)

and code details, see Table 108 on page 286.

illegal command TCP

The firewall detected a TCP illegal command attack.

NetBIOS TCP

The firewall detected a TCP NetBIOS attack.

ip spoofing - no routing

The firewall classified a packet with no source routing

entry [TCP UDP IGMP

entry as an IP spoofing attack.

ESP GRE OSPF]

 

ip spoofing - no routing

The firewall classified an ICMP packet with no source

entry ICMP (type:%d,

routing entry as an IP spoofing attack.

code:%d)

 

vulnerability ICMP

The firewall detected an ICMP vulnerability attack. For

(type:%d, code:%d)

type and code details, see Table 108 on page 286.

traceroute ICMP (type:%d,

The firewall detected an ICMP traceroute attack. For type

code:%d)

and code details, see Table 108 on page 286.

Table 103 IPSec Logs

LOG MESSAGE

DESCRIPTION

Discard

REPLAY packet

The router received and discarded a packet with an

 

 

incorrect sequence number.

 

 

 

Inbound

packet

The router received a packet that has been altered. A third

authentication failed

party may have altered or tampered with the packet.

280

NBG-460N User’s Guide

Page 280
Image 280
ZyXEL Communications wireless n gigbit router zyxel manual 280, Attack Logs