Page 286 / 421 Scroll up to view Page 281 - 285
Chapter 20 Logs
P-660HN-FxZ Series User’s Guide
283
For type and code details, see
Table 116 on page 285
.
ppp:IPCP
Starting
The PPP connection’s Internet Protocol Control Protocol stage is starting.
ppp:IPCP Opening
The PPP connection’s Internet Protocol Control Protocol stage is opening.
ppp:LCP Closing
The PPP connection’s Link Control Protocol stage is closing.
ppp:IPCP Closing
The PPP connection’s Internet Protocol Control Protocol stage is closing.
Table 111
UPnP Logs
LOG MESSAGE
DESCRIPTION
UPnP pass through Firewall
UPnP packets can pass through the firewall.
Table 112
Content Filtering Logs
LOG MESSAGE
DESCRIPTION
%s: block keyword
The content of a requested web page matched a user defined
keyword.
%s
The system forwarded web content.
Table 113
Attack Logs
LOG MESSAGE
DESCRIPTION
attack [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF attack.
attack ICMP (type:%d,
code:%d)
The firewall detected an ICMP attack.
land [ TCP | UDP | IGMP |
ESP | GRE | OSPF ]
The firewall detected a TCP/UDP/IGMP/ESP/GRE/OSPF land
attack.
land ICMP (type:%d,
code:%d)
The firewall detected an ICMP land attack.
ip spoofing - WAN [ TCP |
UDP | IGMP | ESP | GRE |
OSPF ]
The firewall detected an IP spoofing attack on the WAN port.
ip spoofing - WAN ICMP
(type:%d, code:%d)
The firewall detected an ICMP IP spoofing attack on the WAN
port.
icmp echo : ICMP
(type:%d, code:%d)
The firewall detected an ICMP echo attack.
syn flood TCP
The firewall detected a TCP syn flood attack.
ports scan TCP
The firewall detected a TCP port scan attack.
teardrop TCP
The firewall detected a TCP teardrop attack.
teardrop UDP
The firewall detected an UDP teardrop attack.
teardrop ICMP (type:%d,
code:%d)
The firewall detected an ICMP teardrop attack.
illegal command TCP
The firewall detected a TCP illegal command attack.
Table 110
PPP Logs (continued)
LOG MESSAGE
DESCRIPTION
Page 287 / 421
Chapter 20 Logs
P-660HN-FxZ Series User’s Guide
284
NetBIOS TCP
The firewall detected a TCP NetBIOS attack.
ip spoofing - no routing
entry [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
The firewall classified a packet with no source routing entry as an
IP spoofing attack.
ip spoofing - no routing
entry ICMP (type:%d,
code:%d)
The firewall classified an ICMP packet with no source routing
entry as an IP spoofing attack.
vulnerability ICMP
(type:%d, code:%d)
The firewall detected an ICMP vulnerability attack.
traceroute ICMP (type:%d,
code:%d)
The firewall detected an ICMP traceroute attack.
Table 114
802.1X Logs
LOG MESSAGE
DESCRIPTION
RADIUS accepts user.
A user was authenticated by the RADIUS Server.
RADIUS rejects user. Pls check
RADIUS Server.
A user was not authenticated by the RADIUS Server.
Please check the RADIUS Server.
User logout because of session
timeout expired.
The router logged out a user whose session expired.
User logout because of user
deassociation.
The router logged out a user who ended the session.
User logout because of no
authentication response from
user.
The router logged out a user from which there was no
authentication response.
User logout because of idle
timeout expired.
The router logged out a user whose idle timeout period
expired.
User logout because of user
request.
A user logged out.
No response from RADIUS. Pls
check RADIUS Server.
There is no response message from the RADIUS server,
please check the RADIUS server.
Use RADIUS to authenticate user.
The RADIUS server is operating as the authentication
server.
No Server to authenticate user.
There is no authentication server to authenticate a user.
Table 115
ACL Setting Notes
PACKET DIRECTION
DIRECTION
DESCRIPTION
(L to W)
LAN to WAN
ACL set for packets traveling from the LAN to the WAN.
(W to L)
WAN to LAN
ACL set for packets traveling from the WAN to the LAN.
(L to L/ZyXEL Device)
LAN to LAN/
ZyXEL Device
ACL set for packets traveling from the LAN to the LAN or
the ZyXEL Device.
(W to W/ZyXEL
Device)
WAN to WAN/
ZyXEL Device
ACL set for packets traveling from the WAN to the WAN
or the ZyXEL Device.
Table 113
Attack Logs (continued)
LOG MESSAGE
DESCRIPTION
Page 288 / 421
Chapter 20 Logs
P-660HN-FxZ Series User’s Guide
285
Table 116
ICMP Notes
TYPE
CODE
DESCRIPTION
0
Echo Reply
0
Echo reply message
3
Destination Unreachable
0
Net unreachable
1
Host unreachable
2
Protocol unreachable
3
Port unreachable
4
A packet that needed fragmentation was dropped because it was set to Don't
Fragment (DF)
5
Source route failed
4
Source Quench
0
A gateway may discard internet datagrams if it does not have the buffer space
needed to queue the datagrams for output to the next network on the route to
the destination network.
5
Redirect
0
Redirect datagrams for the Network
1
Redirect datagrams for the Host
2
Redirect datagrams for the Type of Service and Network
3
Redirect datagrams for the Type of Service and Host
8
Echo
0
Echo message
11
Time Exceeded
0
Time to live exceeded in transit
1
Fragment reassembly time exceeded
12
Parameter Problem
0
Pointer indicates the error
13
Timestamp
0
Timestamp request message
14
Timestamp Reply
0
Timestamp reply message
15
Information Request
0
Information request message
16
Information Reply
0
Information reply message
Page 289 / 421
Chapter 20 Logs
P-660HN-FxZ Series User’s Guide
286
The following table shows RFC-2408 ISAKMP payload types that the log displays. Please
refer to RFC 2408 for detailed information on each type.
Table 117
Syslog Logs
LOG MESSAGE
DESCRIPTION
<Facility*8 + Severity>Mon dd
hr:mm:ss hostname
src="<srcIP:srcPort>"
dst="<dstIP:dstPort>"
msg="<msg>" note="<note>"
devID="<mac address last three
numbers>" cat="<category>
"This message is sent by the system ("RAS" displays as
the system name if you haven’t configured one) when the
router generates a syslog. The facility is defined in the web
MAIN MENU->LOGS->Log Settings page. The severity is
the log’s syslog class. The definition of messages and
notes are defined in the various log charts throughout this
appendix. The “devID” is the last three characters of the
MAC address of the router’s LAN port. The “cat” is the
same as the category in the router’s logs.
Table 118
RFC-2408 ISAKMP Payload Types
LOG DISPLAY
PAYLOAD TYPE
SA
Security Association
PROP
Proposal
TRANS
Transform
KE
Key Exchange
ID
Identification
CER
Certificate
CER_REQ
Certificate Request
HASH
Hash
SIG
Signature
NONCE
Nonce
NOTFY
Notification
DEL
Delete
VID
Vendor ID
Page 290 / 421
P-660HN-FxZ Series User’s Guide
287
C
HAPTER
21
Tools
21.1
Overview
This chapter explains how to upload new firmware, manage configuration files and restart
your ZyXEL Device.
Use the instructions in this chapter to change the device’s configuration file or upgrade its
firmware. After you configure your device, you can backup the configuration file to a
computer. That way if you later misconfigure the device, you can upload the backed up
configuration file to return to your previous settings. You can alternately upload the factory
default configuration file if you want to return the device to the original default settings. The
firmware determines the device’s available features and functionality. You can download new
firmware releases from your nearest ZyXEL FTP site (or www.zyxel.com) to use to upgrade
your device’s performance.
1
Only use firmware for your device’s specific model. Refer to the label on the
bottom of your ZyXEL Device.
21.1.1
What You Can Do in the Tool Screens
Use the
Firmware Upgrade
screen (
Section 21.2 on page 293
) to upload firmware to
your device.
Use the
Configuration
screen (
Section 21.3 on page 295
) to backup and restore device
configurations. You can also reset your device settings back to the factory default.
Use the
Restart
screen (
Section 21.4 on page 297
) to restart your ZyXEL device.
21.1.2
What You Need To Know About Tools
Filename Conventions
The configuration file (often called the romfile or rom-0) contains the factory default settings
in the menus such as password, DHCP Setup, TCP/IP Setup, etc. It arrives from ZyXEL with a
“rom” filename extension. Once you have customized the ZyXEL Device's settings, they can
be saved back to your computer under a filename of your choosing.

Rate

4 / 5 based on 1 vote.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top