Page 201 / 268 Scroll up to view Page 196 - 200
Chapter 16 Logs
P-660R-F1 Series User’s Guide
201
Table 85
802.1X Logs
Table 86
ACL
Setting N
ports scan TCP
The firewall detected a TCP port scan attack.
teardrop TCP
The firewall detected a TCP teardrop attack.
teardrop UDP
The firewall detected an UDP teardrop attack.
teardrop ICMP (type:%d,
code:%d)
The firewall detected an ICMP teardrop attack.
illegal command TCP
The firewall detected a TCP illegal command attack.
NetBIOS TCP
The firewall detected a TCP NetBIOS attack.
ip spoofing - no routing
entry [ TCP | UDP | IGMP
| ESP | GRE | OSPF ]
The firewall classified a packet with no source routing entry as an
IP spoofing attack.
ip spoofing - no routing
entry ICMP (type:%d,
code:%d)
The firewall classified an ICMP packet with no source routing
entry as an IP spoofing attack.
vulnerability ICMP
(type:%d, code:%d)
The firewall detected an ICMP vulnerability attack.
traceroute ICMP (type:%d,
code:%d)
The firewall detected an ICMP traceroute attack.
LOG MESSAGE
DESCRIPTION
RADIUS accepts user.
A user was authenticated by the RADIUS Server.
RADIUS rejects user. Pls check
RADIUS Server.
A user was not authenticated by the RADIUS Server.
Please check the RADIUS Server.
User logout because of session
timeout expired.
The router logged out a user whose session expired.
User logout because of user
deassociation.
The router logged out a user who ended the session.
User logout because of no
authentication response from
user.
The router logged out a user from which there was no
authentication response.
User logout because of idle
timeout expired.
The router logged out a user whose idle timeout period
expired.
User logout because of user
request.
A user logged out.
No response from RADIUS. Pls
check RADIUS Server.
There is no response message from the RADIUS server,
please check the RADIUS server.
Use RADIUS to authenticate user.
The RADIUS server is operating as the authentication
server.
No Server to authenticate user.
There is no authentication server to authenticate a user.
PACKET DIRECTION
DIRECTION
DESCRIPTION
(L to W)
LAN to WAN
ACL set for packets traveling from the LAN to the WAN.
(W to L)
WAN to LAN
ACL set for packets traveling from the WAN to the LAN.
LOG MESSAGE
DESCRIPTION
Page 202 / 268
Chapter 16 Logs
P-660R-F1 Series User’s Guide
202
Table 87
ICMP Notes
(L to ZyXEL Device)
LAN to ZyXEL
Device
ACL set for packets traveling from the LAN to the ZyXEL
Device.
(W to ZyXEL Device)
WAN to ZyXEL
Device
ACL set for packets traveling from the WAN to the
ZyXEL Device.
TYPE
CODE
DESCRIPTION
0
Echo Reply
0
Echo reply message
3
Destination Unreachable
0
Net unreachable
1
Host unreachable
2
Protocol unreachable
3
Port unreachable
4
A packet that needed fragmentation was dropped because it was set to Don't
Fragment (DF)
5
Source route failed
4
Source Quench
0
A gateway may discard internet datagrams if it does not have the buffer space
needed to queue the datagrams for output to the next network on the route to
the destination network.
5
Redirect
0
Redirect datagrams for the Network
1
Redirect datagrams for the Host
2
Redirect datagrams for the Type of Service and Network
3
Redirect datagrams for the Type of Service and Host
8
Echo
0
Echo message
11
Time Exceeded
0
Time to live exceeded in transit
1
Fragment reassembly time exceeded
12
Parameter Problem
0
Pointer indicates the error
13
Timestamp
0
Timestamp request message
14
Timestamp Reply
0
Timestamp reply message
15
Information Request
0
Information request message
PACKET DIRECTION
DIRECTION
DESCRIPTION
Page 203 / 268
Chapter 16 Logs
P-660R-F1 Series User’s Guide
203
Table 88
System Logs
The following table shows RFC-2408 ISAKMP payload types that the log displays. Please refer to
RFC 2408 for detailed information on each type.
Table 89
RFC-2408 ISAKMP Payload Types
16
Information Reply
0
Information reply message
LOG MESSAGE
DESCRIPTION
<Facility*8 + Severity>Mon dd
hr:mm:ss hostname
src="<srcIP:srcPort>"
dst="<dstIP:dstPort>"
msg="<msg>" note="<note>"
devID="<mac address last three
numbers>" cat="<category>
"This message is sent by the system ("RAS" displays as
the system name if you haven’t configured one) when the
router generates a syslog. The facility is defined in the
web MAIN MENU->LOGS->Log Settings page. The
severity is the log’s syslog class. The definition of
messages and notes are defined in the various log charts
throughout this appendix. The “devID” is the last three
characters of the MAC address of the router’s LAN port.
The “cat” is the same as the category in the router’s logs.
LOG DISPLAY
PAYLOAD TYPE
SA
Security Association
PROP
Proposal
TRANS
Transform
KE
Key Exchange
ID
Identification
CER
Certificate
CER_REQ
Certificate Request
HASH
Hash
SIG
Signature
NONCE
Nonce
NOTFY
Notification
DEL
Delete
VID
Vendor ID
TYPE
CODE
DESCRIPTION
Page 204 / 268
Chapter 16 Logs
P-660R-F1 Series User’s Guide
204
Page 205 / 268
P-660R-F1 Series User’s Guide
205
C
HAPTER
17
Tools
This chapter describes how to upload new firmware, manage configuration and restart your ZyXEL
Device.
17.1
Firmware Upgrade
Find firmware at www.zyxel.com in a file that (usually) uses the system model name with a.bin
extension, for example, "ZyXEL Device.bin". The upload process uses HTTP (Hypertext Transfer
Protocol) and may take up to two minutes. After a successful upload, the system will reboot.
Only use firmware for your device’s specific model. Refer to the label on the bottom of your device.
Click
Maintenance > Tools
to open the
Firmware
screen. Follow the instructions in this screen to
upload firmware to your ZyXEL Device.
Figure 126
Firmware Upgrade
The following table describes the labels in this screen.
Table 90
Firmware Upgrade
LABEL
DESCRIPTION
Current Firmware
Version
This is the present Firmware version and the date created.
File Path
Type in the location of the file you want to upload in this field or click
Browse ...
to find it.
Browse...
Click
Browse...
to find the .bin file you want to upload. Remember that you must
decompress compressed (.zip) files before you can upload them.
Upload
Click
Upload
to begin the upload process. This process may take up to two
minutes.

Rate

4.5 / 5 based on 2 votes.

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top