ZyWALL 2 User’s Guide
| Chart |
|
|
LOG MESSAGE | DESCRIPTION |
|
|
Filter match DROP <set | Access matched the listed filter rule and the ZyWALL dropped the |
%d/rule %d> | packet to block access. |
Filter match DROP <set | Access matched the listed filter rule (denied LAN IP) and the ZyWALL |
%d/rule %d> | dropped the packet to block access. |
Filter match FORWARD | TCP access matched the listed filter rule. Access was allowed and the |
<set %d/rule %d> | router forwarded the packet. |
Filter match FORWARD | UDP access matched the listed filter rule. Access was allowed and |
<set %d/rule %d> | the router forwarded the packet. |
Filter match FORWARD | ICMP access matched the listed filter rule. Access was allowed and |
<set %d/rule %d> | the router forwarded the packet. |
Filter match FORWARD | Access matched the listed filter rule. Access was allowed and the |
<set %d/rule %d> | router forwarded the packet. |
Filter match FORWARD | Access matched the listed filter rule (denied LAN IP). Access was |
<set %d/rule %d> | allowed and the router forwarded the packet. |
(set:%d) | With firewall messages, this is the number of the ACL policy set and |
| denotes the packet's direction (see Chart |
| With filter messages, this is the number of the filter set. |
|
|
(rule:%d) | With firewall messages, the firewall rule number denotes the number |
| of a firewall rule within an ACL policy set. |
| With filter messages, this is the number of an individual filter rule. |
|
|
Router sent blocked | A message was sent to notify a user that the router blocked access to |
web site message | a requested web site |
|
|
Triangle route packet | The firewall allowed a triangle route session to pass through. |
forwarded |
|
Firewall sent TCP | The firewall detected a DoS attack and sent a TCP packet(s) in |
packet in response to | response. |
DoS attack |
|
Firewall sent TCP | The firewall sent out TCP reset packets. |
reset packets |
|
Log Descriptions |