ZyWALL 2 User’s Guide
| Chart |
|
|
LOG MESSAGE | DESCRIPTION |
|
|
syn flood TCP | The firewall detected a TCP syn flood attack. |
ports scan TCP | The firewall detected a TCP port scan attack. |
teardrop TCP | The firewall detected a TCP teardrop attack. |
teardrop UDP | The firewall detected an UDP teardrop attack. |
teardrop ICMP | The firewall detected an ICMP teardrop attack; see the section on |
(type:%d, code:%d) | ICMP messages for type and code details. |
illegal command TCP | The firewall detected a TCP illegal command attack. |
NetBIOS TCP | The firewall detected a TCP NetBIOS attack. |
ip spoofing - no | The firewall detected a TCP IP spoofing attack while the ZyWALL did |
routing entry TCP | not have a default route. |
ip spoofing - no | The firewall detected an UDP IP spoofing attack while the ZyWALL did |
routing entry UDP | not have a default route. |
ip spoofing - no | The firewall detected an IGMP IP spoofing attack while the ZyWALL |
routing entry IGMP | did not have a default route. |
ip spoofing - no | The firewall detected an ESP IP spoofing attack while the ZyWALL did |
routing entry ESP | not have a default route. |
ip spoofing - no | The firewall detected a GRE IP spoofing attack while the ZyWALL did |
routing entry GRE | not have a default route. |
ip spoofing - no | The firewall detected an OSPF IP spoofing attack while the ZyWALL |
routing entry OSPF | did not have a default route. |
ip spoofing - no | The firewall detected an ICMP IP spoofing attack while the ZyWALL |
routing entry ICMP | did not have a default route; see the section on ICMP messages for |
(type:%d, code:%d) | type and code details. |
| |
vulnerability ICMP | The firewall detected an ICMP vulnerability attack; see the section on |
(type:%d, code:%d) | ICMP messages for type and code details. |
traceroute ICMP | The firewall detected an ICMP traceroute attack; see the section on |
(type:%d, code:%d) | ICMP messages for type and code details. |
Log Descriptions |