ZyWALL 10 Internet Security Gateway
9.3.3 Call-Triggering Packet
IP Frame: | 44/ | 44 | Time: 17:02:44.262 | ||||
Frame Type: |
|
|
|
|
|
|
|
IP Header: |
|
|
|
|
|
|
|
IP Version |
|
|
|
| = | 4 |
|
Header Length |
|
|
| = | 20 |
| |
Type of Service |
|
| = | 0x00 (0) | |||
Total Length |
|
|
| = | 0x002C (44) | ||
Identification |
|
|
| = 0x0002 (2) | |||
Flags |
|
|
|
| = | 0x00 |
|
Fragment Offset |
|
| = | 0x00 |
| ||
Time to Live |
|
|
| = | 0xFE (254) | ||
Protocol |
|
|
|
| = | 0x06 (TCP) | |
Header Checksum |
|
| = | 0xFB20 (64288) | |||
Source IP |
|
|
|
| = | 0xC0A80101 (192.168.1.1) | |
Destination IP |
|
| = | 0x00000000 (0.0.0.0) | |||
TCP Header: |
|
|
|
|
|
|
|
Source Port |
|
|
| = | 0x0401 (1025) | ||
Destination Port |
|
| = | 0x000D (13) | |||
Sequence Number |
|
| = | 0x05B8D000 (95997952) | |||
Ack Number |
|
|
|
| = | 0x00000000 (0) | |
Header Length |
|
|
| = | 24 |
| |
Flags |
|
|
|
| = | 0x02 (....S.) | |
Window Size |
|
|
| = | 0x2000 (8192) | ||
Checksum |
|
|
|
| = | 0xE06A (57450) | |
Urgent Ptr |
|
|
|
| = | 0x0000 (0) | |
Options |
|
|
|
| = |
|
|
0000: | 02 | 04 | 02 | 00 |
|
|
|
RAW DATA: |
|
|
|
|
|
|
|
0000: 45 00 00 2C 00 02 00 | |||||||
0010: 00 00 00 00 04 01 00 | |||||||
0020: 60 02 20 00 E0 6A 00 | |||||||
Press any key to continue... |
|
|
| ||||
|
|
|
|
|
|
|
|
Figure 9-9 Call-Triggering Packet Example
9.4Diagnostic
The diagnostic facility allows you to test the different aspects of your ZyWALL to determine if it is working properly. Menu 24.4 allows you to choose among various types of diagnostic tests to evaluate your system, as shown next.
System Information & Diagnosis |